Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2023, 09:08
Static task
static1
General
-
Target
7071546f66b8fd9147edd5a89dea1f91573876f9b0d0f9761e19f1a1dd3e86b4.exe
-
Size
705KB
-
MD5
2601b2d985aa8574f182423edd67bbd3
-
SHA1
14f25f0a1dc3550d7591d44d456bb370fa283470
-
SHA256
7071546f66b8fd9147edd5a89dea1f91573876f9b0d0f9761e19f1a1dd3e86b4
-
SHA512
745e6f9a807ba965a7417085b2f956e9731608433271dbbac3c3d51439f6041ccf69fa95c7d4b0912603e1b3cff7db1d26557a3045b89a7a25ba1abd2cf79843
-
SSDEEP
12288:vy90O/VBVr656doAyeH4D8EEV3+N9sXnuRvNILSl9idONv1x+fNDY:vyVy56ZxYDaIsXuRvNILm9idONvL8NDY
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr215530.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr215530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr215530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr215530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr215530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr215530.exe -
Executes dropped EXE 4 IoCs
pid Process 4876 un679596.exe 724 pr215530.exe 4156 qu103991.exe 5100 si501767.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr215530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr215530.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7071546f66b8fd9147edd5a89dea1f91573876f9b0d0f9761e19f1a1dd3e86b4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7071546f66b8fd9147edd5a89dea1f91573876f9b0d0f9761e19f1a1dd3e86b4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un679596.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un679596.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4952 724 WerFault.exe 84 5036 4156 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 724 pr215530.exe 724 pr215530.exe 4156 qu103991.exe 4156 qu103991.exe 5100 si501767.exe 5100 si501767.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 724 pr215530.exe Token: SeDebugPrivilege 4156 qu103991.exe Token: SeDebugPrivilege 5100 si501767.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3528 wrote to memory of 4876 3528 7071546f66b8fd9147edd5a89dea1f91573876f9b0d0f9761e19f1a1dd3e86b4.exe 83 PID 3528 wrote to memory of 4876 3528 7071546f66b8fd9147edd5a89dea1f91573876f9b0d0f9761e19f1a1dd3e86b4.exe 83 PID 3528 wrote to memory of 4876 3528 7071546f66b8fd9147edd5a89dea1f91573876f9b0d0f9761e19f1a1dd3e86b4.exe 83 PID 4876 wrote to memory of 724 4876 un679596.exe 84 PID 4876 wrote to memory of 724 4876 un679596.exe 84 PID 4876 wrote to memory of 724 4876 un679596.exe 84 PID 4876 wrote to memory of 4156 4876 un679596.exe 90 PID 4876 wrote to memory of 4156 4876 un679596.exe 90 PID 4876 wrote to memory of 4156 4876 un679596.exe 90 PID 3528 wrote to memory of 5100 3528 7071546f66b8fd9147edd5a89dea1f91573876f9b0d0f9761e19f1a1dd3e86b4.exe 93 PID 3528 wrote to memory of 5100 3528 7071546f66b8fd9147edd5a89dea1f91573876f9b0d0f9761e19f1a1dd3e86b4.exe 93 PID 3528 wrote to memory of 5100 3528 7071546f66b8fd9147edd5a89dea1f91573876f9b0d0f9761e19f1a1dd3e86b4.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\7071546f66b8fd9147edd5a89dea1f91573876f9b0d0f9761e19f1a1dd3e86b4.exe"C:\Users\Admin\AppData\Local\Temp\7071546f66b8fd9147edd5a89dea1f91573876f9b0d0f9761e19f1a1dd3e86b4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un679596.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un679596.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr215530.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr215530.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 724 -s 10884⤵
- Program crash
PID:4952
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu103991.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu103991.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 13244⤵
- Program crash
PID:5036
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si501767.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si501767.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 724 -ip 7241⤵PID:1520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4156 -ip 41561⤵PID:5048
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
551KB
MD52ffb36350c105447a1e37148956a12ba
SHA13b6403d4a282005ab52282c85f1b4f6eb5dc2bdc
SHA25630518d6c36f4224b708596630566d26658585d92eb2860301afb18ce54c40881
SHA5128ff5bbe240f970aefd24c3915cfee08c3e3f25c9558d54d7852fa8bccf5e96207b6ca89de4b1d0a694c1a01ea2e8f46ea6afacf07744b968ef99aecded4b063c
-
Filesize
551KB
MD52ffb36350c105447a1e37148956a12ba
SHA13b6403d4a282005ab52282c85f1b4f6eb5dc2bdc
SHA25630518d6c36f4224b708596630566d26658585d92eb2860301afb18ce54c40881
SHA5128ff5bbe240f970aefd24c3915cfee08c3e3f25c9558d54d7852fa8bccf5e96207b6ca89de4b1d0a694c1a01ea2e8f46ea6afacf07744b968ef99aecded4b063c
-
Filesize
286KB
MD5c888d0f52a891395d902049bd937d71d
SHA1033fcdc40f13b3389a8a896685b29b7e277523e9
SHA2567a0ced2893d725591206f150a9555bfffbf1497a99df0c4b3cdbcb12023d5376
SHA512ccb13b2913d0e6d75d5a062d2ca9b17578398eb9b4834b22a74bd829f3b72784cb22cb06d79ee7289ee8d941395a4c2ffb1adc1f6d6d23eec26718d7f799035a
-
Filesize
286KB
MD5c888d0f52a891395d902049bd937d71d
SHA1033fcdc40f13b3389a8a896685b29b7e277523e9
SHA2567a0ced2893d725591206f150a9555bfffbf1497a99df0c4b3cdbcb12023d5376
SHA512ccb13b2913d0e6d75d5a062d2ca9b17578398eb9b4834b22a74bd829f3b72784cb22cb06d79ee7289ee8d941395a4c2ffb1adc1f6d6d23eec26718d7f799035a
-
Filesize
368KB
MD5d9e3c818717d2991f9689906f2e1a867
SHA15da5a46155809ebe627c48d55b36eaed128b7c59
SHA256914db972389e5cecf905ef8718ba7ae42589de222455cf1373d5c2260a445bdc
SHA512205675b04c0f91fcae4ae48b974a265f66378c0036973b913fb1af2da06987dee813cb99a72acc8d58447b3b8e15f78ecc7557beaf06d51b56caf94902d306ac
-
Filesize
368KB
MD5d9e3c818717d2991f9689906f2e1a867
SHA15da5a46155809ebe627c48d55b36eaed128b7c59
SHA256914db972389e5cecf905ef8718ba7ae42589de222455cf1373d5c2260a445bdc
SHA512205675b04c0f91fcae4ae48b974a265f66378c0036973b913fb1af2da06987dee813cb99a72acc8d58447b3b8e15f78ecc7557beaf06d51b56caf94902d306ac