Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2023, 04:22
Static task
static1
General
-
Target
f3447d2e9b06ad7c08c8368f25c66ae9b61c45ac6c0c43f25c55593ce7193b30.exe
-
Size
707KB
-
MD5
d05576300c10c6291b7e59bb3051e677
-
SHA1
40709fbd4c8b944a06d7608cbfa48c4fcc8781f4
-
SHA256
f3447d2e9b06ad7c08c8368f25c66ae9b61c45ac6c0c43f25c55593ce7193b30
-
SHA512
3966a79e12e0a15f97e9a6cafea24c02b8005e77b99c86a7ac549283b09cf77ab9d428a5bd07268ff38788e9a5b0c8f44d7d91a8d9a5ab42796ce9907a284932
-
SSDEEP
12288:Zy906/raYOi1jP7+nPFw6Z3zblV0TupBBKkFTn10qubVJ944uwXvo:Zy9r7Oi1jqG6Z3PP0TuBRTquwXvo
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr683721.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr683721.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr683721.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr683721.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr683721.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr683721.exe -
Executes dropped EXE 4 IoCs
pid Process 4316 un532775.exe 4912 pr683721.exe 64 qu779257.exe 2452 si971840.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr683721.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr683721.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un532775.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f3447d2e9b06ad7c08c8368f25c66ae9b61c45ac6c0c43f25c55593ce7193b30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f3447d2e9b06ad7c08c8368f25c66ae9b61c45ac6c0c43f25c55593ce7193b30.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un532775.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2080 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4864 4912 WerFault.exe 85 4684 64 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4912 pr683721.exe 4912 pr683721.exe 64 qu779257.exe 64 qu779257.exe 2452 si971840.exe 2452 si971840.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4912 pr683721.exe Token: SeDebugPrivilege 64 qu779257.exe Token: SeDebugPrivilege 2452 si971840.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4896 wrote to memory of 4316 4896 f3447d2e9b06ad7c08c8368f25c66ae9b61c45ac6c0c43f25c55593ce7193b30.exe 84 PID 4896 wrote to memory of 4316 4896 f3447d2e9b06ad7c08c8368f25c66ae9b61c45ac6c0c43f25c55593ce7193b30.exe 84 PID 4896 wrote to memory of 4316 4896 f3447d2e9b06ad7c08c8368f25c66ae9b61c45ac6c0c43f25c55593ce7193b30.exe 84 PID 4316 wrote to memory of 4912 4316 un532775.exe 85 PID 4316 wrote to memory of 4912 4316 un532775.exe 85 PID 4316 wrote to memory of 4912 4316 un532775.exe 85 PID 4316 wrote to memory of 64 4316 un532775.exe 91 PID 4316 wrote to memory of 64 4316 un532775.exe 91 PID 4316 wrote to memory of 64 4316 un532775.exe 91 PID 4896 wrote to memory of 2452 4896 f3447d2e9b06ad7c08c8368f25c66ae9b61c45ac6c0c43f25c55593ce7193b30.exe 94 PID 4896 wrote to memory of 2452 4896 f3447d2e9b06ad7c08c8368f25c66ae9b61c45ac6c0c43f25c55593ce7193b30.exe 94 PID 4896 wrote to memory of 2452 4896 f3447d2e9b06ad7c08c8368f25c66ae9b61c45ac6c0c43f25c55593ce7193b30.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3447d2e9b06ad7c08c8368f25c66ae9b61c45ac6c0c43f25c55593ce7193b30.exe"C:\Users\Admin\AppData\Local\Temp\f3447d2e9b06ad7c08c8368f25c66ae9b61c45ac6c0c43f25c55593ce7193b30.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un532775.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un532775.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr683721.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr683721.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 10804⤵
- Program crash
PID:4864
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu779257.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu779257.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:64 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 13204⤵
- Program crash
PID:4684
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si971840.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si971840.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4912 -ip 49121⤵PID:4320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 64 -ip 641⤵PID:1912
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2080
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
553KB
MD5b98bfec3cf7799f32f93e3dbae242412
SHA15e41f772ef112a37c5fb15184cbd4ed3960279cf
SHA25600ff24ae2bd9d2eb414738b52a257774cd048f4d57d59780154e43801cea1383
SHA5122611db72ceae596afb68669609a3c983e55559e2c13bcfac007d8bb320f2ee38ae660141de8755f4bdeff04df5272cf63187e5cd91403de2843f52e6587e33f5
-
Filesize
553KB
MD5b98bfec3cf7799f32f93e3dbae242412
SHA15e41f772ef112a37c5fb15184cbd4ed3960279cf
SHA25600ff24ae2bd9d2eb414738b52a257774cd048f4d57d59780154e43801cea1383
SHA5122611db72ceae596afb68669609a3c983e55559e2c13bcfac007d8bb320f2ee38ae660141de8755f4bdeff04df5272cf63187e5cd91403de2843f52e6587e33f5
-
Filesize
283KB
MD5c151b773a8428e620af45871b05fca60
SHA128b7dd9c2b3ed2e65999f3a4e272170b2a2a7e3f
SHA2566fe24550b505839da29cb5dcdacbb9a46e8d429a8affb9db3aea229aa288ce80
SHA512d65189daa968b4334e4e4055ae7c60bce96623ce5aeae482f58b35f84cd13f7079a16029d2e96ca6275f2750fc9464cdfad507fba93f30ddbd555bdc4cc43588
-
Filesize
283KB
MD5c151b773a8428e620af45871b05fca60
SHA128b7dd9c2b3ed2e65999f3a4e272170b2a2a7e3f
SHA2566fe24550b505839da29cb5dcdacbb9a46e8d429a8affb9db3aea229aa288ce80
SHA512d65189daa968b4334e4e4055ae7c60bce96623ce5aeae482f58b35f84cd13f7079a16029d2e96ca6275f2750fc9464cdfad507fba93f30ddbd555bdc4cc43588
-
Filesize
353KB
MD5f77f30e3f061bfd56310f67af8f6fbe2
SHA1f135038f7e79f9481bff68d9771dfeee96214fb8
SHA25695aa7449e6a7ae164983fa13bf8802ad1b12995f3d2e2ad0289f72be112b3719
SHA512fd0c808f89855cef8876a651c5f6f0acb7a1f19501ea136688c5745753d9a39608491344681ea7b8f2ec6ff7862c766fad19863a8441419b1f5009caf9223b29
-
Filesize
353KB
MD5f77f30e3f061bfd56310f67af8f6fbe2
SHA1f135038f7e79f9481bff68d9771dfeee96214fb8
SHA25695aa7449e6a7ae164983fa13bf8802ad1b12995f3d2e2ad0289f72be112b3719
SHA512fd0c808f89855cef8876a651c5f6f0acb7a1f19501ea136688c5745753d9a39608491344681ea7b8f2ec6ff7862c766fad19863a8441419b1f5009caf9223b29