Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    50s
  • max time network
    67s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23/04/2023, 08:32

General

  • Target

    b708802895b708c5518d39bfc3afb0bd06beacec579beaae80ff0d52bf2622ed.exe

  • Size

    706KB

  • MD5

    0165c212287d4b9c39dac4d47ffefac8

  • SHA1

    2946e6d800b19f8a6a83a6e96848a4f3f591043e

  • SHA256

    b708802895b708c5518d39bfc3afb0bd06beacec579beaae80ff0d52bf2622ed

  • SHA512

    ed0480d3af980a5c1095583013e89620b76da3565b322516c847e5818b1b161aa5ca0258b89473c6f6d2bb819b4ac7d2e541d5ca71c8887c4e53481151d035f8

  • SSDEEP

    12288:Vy90N85FjGmED01jO+2btNz5rVLygM1fpC5b4EbduIvjK6Kr2:Vy8EFHM0tl2BNdhLqpC5b4EJxLKr2

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b708802895b708c5518d39bfc3afb0bd06beacec579beaae80ff0d52bf2622ed.exe
    "C:\Users\Admin\AppData\Local\Temp\b708802895b708c5518d39bfc3afb0bd06beacec579beaae80ff0d52bf2622ed.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3640
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un508055.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un508055.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3644
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr581685.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr581685.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4156
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu848528.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu848528.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3880
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si412022.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si412022.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3052

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si412022.exe

    Filesize

    136KB

    MD5

    8c80b06d843bd6a7599a5be2075d9a55

    SHA1

    caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

    SHA256

    e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

    SHA512

    cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si412022.exe

    Filesize

    136KB

    MD5

    8c80b06d843bd6a7599a5be2075d9a55

    SHA1

    caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

    SHA256

    e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

    SHA512

    cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un508055.exe

    Filesize

    552KB

    MD5

    8189ac8331be1a54342f9081d9538741

    SHA1

    1152283d3f50b37218317d4302d8113a6aa60b24

    SHA256

    a26f2e8763190edaed6ab50af5e0de156c1a20614ea26cbff68c9fca3b342c4c

    SHA512

    3e09b7768e8e23a68ec9b9c4f0dab284d8ef01031a238a600eb9fd275ac9ebb4781b5f6f7802ec1e0b63bc7de7d65c616df8a023b6190bd963812bec395dc69d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un508055.exe

    Filesize

    552KB

    MD5

    8189ac8331be1a54342f9081d9538741

    SHA1

    1152283d3f50b37218317d4302d8113a6aa60b24

    SHA256

    a26f2e8763190edaed6ab50af5e0de156c1a20614ea26cbff68c9fca3b342c4c

    SHA512

    3e09b7768e8e23a68ec9b9c4f0dab284d8ef01031a238a600eb9fd275ac9ebb4781b5f6f7802ec1e0b63bc7de7d65c616df8a023b6190bd963812bec395dc69d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr581685.exe

    Filesize

    285KB

    MD5

    c71962c78a4903225a0823fe41dc406b

    SHA1

    a635fc1a9a4ed562fc84bf012de79abfee93ba31

    SHA256

    39915bbbde4df7614926ea356ea9e8ee1b12629652bfcfd585714162aa4176d1

    SHA512

    395a6a748ddf5b489d99e00891ad7c14724c8b37acc2e366e5b5ae1271de09f739c638d6f1261995c261fcb5e840e90169fa63d936bf1a02c47676af997aa42c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr581685.exe

    Filesize

    285KB

    MD5

    c71962c78a4903225a0823fe41dc406b

    SHA1

    a635fc1a9a4ed562fc84bf012de79abfee93ba31

    SHA256

    39915bbbde4df7614926ea356ea9e8ee1b12629652bfcfd585714162aa4176d1

    SHA512

    395a6a748ddf5b489d99e00891ad7c14724c8b37acc2e366e5b5ae1271de09f739c638d6f1261995c261fcb5e840e90169fa63d936bf1a02c47676af997aa42c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu848528.exe

    Filesize

    368KB

    MD5

    8f3ff9052aed2c6536eaffe6a71926a0

    SHA1

    8ae01db682eb96b9e51b747de6e23d1b83619809

    SHA256

    da2b390df0f2f76ad42346a724ecbccd6257d4c1d7a8efb8e24d4645849480bb

    SHA512

    62fac14b304fb799fa6dc4ce2a1197917082f4946f66b0f40590b5504565c56c06876fd2d8f6aad3229fa871dad0b7e520109f827ddddeb655074a503b41c25e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu848528.exe

    Filesize

    368KB

    MD5

    8f3ff9052aed2c6536eaffe6a71926a0

    SHA1

    8ae01db682eb96b9e51b747de6e23d1b83619809

    SHA256

    da2b390df0f2f76ad42346a724ecbccd6257d4c1d7a8efb8e24d4645849480bb

    SHA512

    62fac14b304fb799fa6dc4ce2a1197917082f4946f66b0f40590b5504565c56c06876fd2d8f6aad3229fa871dad0b7e520109f827ddddeb655074a503b41c25e

  • memory/3052-998-0x00000000076E0000-0x00000000076F0000-memory.dmp

    Filesize

    64KB

  • memory/3052-997-0x0000000007770000-0x00000000077BB000-memory.dmp

    Filesize

    300KB

  • memory/3052-996-0x00000000009D0000-0x00000000009F8000-memory.dmp

    Filesize

    160KB

  • memory/3880-216-0x0000000004BF0000-0x0000000004C25000-memory.dmp

    Filesize

    212KB

  • memory/3880-978-0x0000000009C00000-0x0000000009C12000-memory.dmp

    Filesize

    72KB

  • memory/3880-990-0x000000000B280000-0x000000000B7AC000-memory.dmp

    Filesize

    5.2MB

  • memory/3880-988-0x000000000B0A0000-0x000000000B262000-memory.dmp

    Filesize

    1.8MB

  • memory/3880-987-0x000000000AFE0000-0x000000000AFFE000-memory.dmp

    Filesize

    120KB

  • memory/3880-986-0x000000000AE40000-0x000000000AEB6000-memory.dmp

    Filesize

    472KB

  • memory/3880-985-0x000000000ADD0000-0x000000000AE20000-memory.dmp

    Filesize

    320KB

  • memory/3880-984-0x000000000AD20000-0x000000000ADB2000-memory.dmp

    Filesize

    584KB

  • memory/3880-983-0x000000000A060000-0x000000000A0C6000-memory.dmp

    Filesize

    408KB

  • memory/3880-982-0x0000000009ED0000-0x0000000009F1B000-memory.dmp

    Filesize

    300KB

  • memory/3880-981-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/3880-980-0x0000000009D50000-0x0000000009D8E000-memory.dmp

    Filesize

    248KB

  • memory/3880-979-0x0000000009C30000-0x0000000009D3A000-memory.dmp

    Filesize

    1.0MB

  • memory/3880-977-0x000000000A210000-0x000000000A816000-memory.dmp

    Filesize

    6.0MB

  • memory/3880-218-0x0000000004BF0000-0x0000000004C25000-memory.dmp

    Filesize

    212KB

  • memory/3880-214-0x0000000004BF0000-0x0000000004C25000-memory.dmp

    Filesize

    212KB

  • memory/3880-212-0x0000000004BF0000-0x0000000004C25000-memory.dmp

    Filesize

    212KB

  • memory/3880-210-0x0000000004BF0000-0x0000000004C25000-memory.dmp

    Filesize

    212KB

  • memory/3880-208-0x0000000004BF0000-0x0000000004C25000-memory.dmp

    Filesize

    212KB

  • memory/3880-206-0x0000000004BF0000-0x0000000004C25000-memory.dmp

    Filesize

    212KB

  • memory/3880-204-0x0000000004BF0000-0x0000000004C25000-memory.dmp

    Filesize

    212KB

  • memory/3880-179-0x0000000004870000-0x00000000048AC000-memory.dmp

    Filesize

    240KB

  • memory/3880-180-0x0000000004BF0000-0x0000000004C2A000-memory.dmp

    Filesize

    232KB

  • memory/3880-181-0x0000000004BF0000-0x0000000004C25000-memory.dmp

    Filesize

    212KB

  • memory/3880-182-0x0000000004BF0000-0x0000000004C25000-memory.dmp

    Filesize

    212KB

  • memory/3880-184-0x0000000004BF0000-0x0000000004C25000-memory.dmp

    Filesize

    212KB

  • memory/3880-186-0x0000000004BF0000-0x0000000004C25000-memory.dmp

    Filesize

    212KB

  • memory/3880-188-0x0000000004BF0000-0x0000000004C25000-memory.dmp

    Filesize

    212KB

  • memory/3880-190-0x0000000004BF0000-0x0000000004C25000-memory.dmp

    Filesize

    212KB

  • memory/3880-192-0x0000000004BF0000-0x0000000004C25000-memory.dmp

    Filesize

    212KB

  • memory/3880-194-0x0000000004BF0000-0x0000000004C25000-memory.dmp

    Filesize

    212KB

  • memory/3880-196-0x0000000002BD0000-0x0000000002C16000-memory.dmp

    Filesize

    280KB

  • memory/3880-198-0x0000000004BF0000-0x0000000004C25000-memory.dmp

    Filesize

    212KB

  • memory/3880-197-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/3880-199-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/3880-202-0x0000000004BF0000-0x0000000004C25000-memory.dmp

    Filesize

    212KB

  • memory/3880-201-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/4156-161-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

    Filesize

    72KB

  • memory/4156-138-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/4156-174-0x0000000000400000-0x0000000002BB1000-memory.dmp

    Filesize

    39.7MB

  • memory/4156-171-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/4156-172-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/4156-170-0x0000000000400000-0x0000000002BB1000-memory.dmp

    Filesize

    39.7MB

  • memory/4156-140-0x00000000071D0000-0x00000000076CE000-memory.dmp

    Filesize

    5.0MB

  • memory/4156-169-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

    Filesize

    72KB

  • memory/4156-167-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

    Filesize

    72KB

  • memory/4156-143-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

    Filesize

    72KB

  • memory/4156-165-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

    Filesize

    72KB

  • memory/4156-163-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

    Filesize

    72KB

  • memory/4156-142-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

    Filesize

    72KB

  • memory/4156-141-0x0000000004CA0000-0x0000000004CB8000-memory.dmp

    Filesize

    96KB

  • memory/4156-149-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

    Filesize

    72KB

  • memory/4156-155-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

    Filesize

    72KB

  • memory/4156-153-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

    Filesize

    72KB

  • memory/4156-151-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

    Filesize

    72KB

  • memory/4156-157-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

    Filesize

    72KB

  • memory/4156-147-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

    Filesize

    72KB

  • memory/4156-145-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

    Filesize

    72KB

  • memory/4156-139-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/4156-159-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

    Filesize

    72KB

  • memory/4156-137-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/4156-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4156-135-0x00000000046E0000-0x00000000046FA000-memory.dmp

    Filesize

    104KB