Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
87s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2023, 11:06
Static task
static1
General
-
Target
33356c5c95b24786f428b424ce1134df23d93f7a36b9a6b1ef65e4c3ebc9111c.exe
-
Size
709KB
-
MD5
0f8a557c456e76d4933d93a733b695c2
-
SHA1
f64ad195f1e01c692d314ccf42aaa6a24f875be1
-
SHA256
33356c5c95b24786f428b424ce1134df23d93f7a36b9a6b1ef65e4c3ebc9111c
-
SHA512
688dd2e795de616683c38d3f3b3bfaa4a439cdc1a7d6eed52febdb82491d3e60d770af272539707da0182ab15f95da25cbc57e35e8b3b09df81debb6c51cdfae
-
SSDEEP
12288:Xy908i+sbC4NgqAQ+vaw8UY/eJ+Avuhdg2MoyzPtxWqFVTQq/dCY:XyBUC4UNJ+qQZLyLWKV/QY
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr182960.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr182960.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr182960.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr182960.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr182960.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr182960.exe -
Executes dropped EXE 4 IoCs
pid Process 1520 un863730.exe 1992 pr182960.exe 2616 qu555030.exe 4536 si468995.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr182960.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr182960.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 33356c5c95b24786f428b424ce1134df23d93f7a36b9a6b1ef65e4c3ebc9111c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 33356c5c95b24786f428b424ce1134df23d93f7a36b9a6b1ef65e4c3ebc9111c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un863730.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un863730.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3380 1992 WerFault.exe 86 4816 2616 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1992 pr182960.exe 1992 pr182960.exe 2616 qu555030.exe 2616 qu555030.exe 4536 si468995.exe 4536 si468995.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1992 pr182960.exe Token: SeDebugPrivilege 2616 qu555030.exe Token: SeDebugPrivilege 4536 si468995.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 856 wrote to memory of 1520 856 33356c5c95b24786f428b424ce1134df23d93f7a36b9a6b1ef65e4c3ebc9111c.exe 85 PID 856 wrote to memory of 1520 856 33356c5c95b24786f428b424ce1134df23d93f7a36b9a6b1ef65e4c3ebc9111c.exe 85 PID 856 wrote to memory of 1520 856 33356c5c95b24786f428b424ce1134df23d93f7a36b9a6b1ef65e4c3ebc9111c.exe 85 PID 1520 wrote to memory of 1992 1520 un863730.exe 86 PID 1520 wrote to memory of 1992 1520 un863730.exe 86 PID 1520 wrote to memory of 1992 1520 un863730.exe 86 PID 1520 wrote to memory of 2616 1520 un863730.exe 92 PID 1520 wrote to memory of 2616 1520 un863730.exe 92 PID 1520 wrote to memory of 2616 1520 un863730.exe 92 PID 856 wrote to memory of 4536 856 33356c5c95b24786f428b424ce1134df23d93f7a36b9a6b1ef65e4c3ebc9111c.exe 95 PID 856 wrote to memory of 4536 856 33356c5c95b24786f428b424ce1134df23d93f7a36b9a6b1ef65e4c3ebc9111c.exe 95 PID 856 wrote to memory of 4536 856 33356c5c95b24786f428b424ce1134df23d93f7a36b9a6b1ef65e4c3ebc9111c.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\33356c5c95b24786f428b424ce1134df23d93f7a36b9a6b1ef65e4c3ebc9111c.exe"C:\Users\Admin\AppData\Local\Temp\33356c5c95b24786f428b424ce1134df23d93f7a36b9a6b1ef65e4c3ebc9111c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un863730.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un863730.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr182960.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr182960.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1992 -s 10884⤵
- Program crash
PID:3380
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu555030.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu555030.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 18084⤵
- Program crash
PID:4816
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si468995.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si468995.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1992 -ip 19921⤵PID:848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2616 -ip 26161⤵PID:2244
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
554KB
MD5fad943e2ed380a9b3c2528c8dafdf651
SHA1a8bed6d86339996ca73dd78944fb88d25ab469cf
SHA2563a1c0d7b52f6859919cfa617eeb3c72db2d5b6f3adc589b80e0bba59a71775ee
SHA512d0ee1a1d237b0a452b3117825550f7d5aa588cfe421fd3aa94080d7b3a2698390f0b9ffff3012f17f83f6f6b8bb56f54b0841d8d448b79b032d627c25185d59c
-
Filesize
554KB
MD5fad943e2ed380a9b3c2528c8dafdf651
SHA1a8bed6d86339996ca73dd78944fb88d25ab469cf
SHA2563a1c0d7b52f6859919cfa617eeb3c72db2d5b6f3adc589b80e0bba59a71775ee
SHA512d0ee1a1d237b0a452b3117825550f7d5aa588cfe421fd3aa94080d7b3a2698390f0b9ffff3012f17f83f6f6b8bb56f54b0841d8d448b79b032d627c25185d59c
-
Filesize
286KB
MD50c33e35a321d13694fd15a6926d33241
SHA12441fd7baa85a522571b91318fa68ad71c452a4b
SHA256215297700f4d2f2692366b27817da462a44ecb3dd74b5a1745c967dd722cfeb2
SHA5127f317f5fc42b7951d9df40e49d1b864ce92755f0418a0c70ca5cff8e207f2ab0ff47668d44a6c7aa78a7bd555f3fff8acfef35210966378b2915ffd08019d288
-
Filesize
286KB
MD50c33e35a321d13694fd15a6926d33241
SHA12441fd7baa85a522571b91318fa68ad71c452a4b
SHA256215297700f4d2f2692366b27817da462a44ecb3dd74b5a1745c967dd722cfeb2
SHA5127f317f5fc42b7951d9df40e49d1b864ce92755f0418a0c70ca5cff8e207f2ab0ff47668d44a6c7aa78a7bd555f3fff8acfef35210966378b2915ffd08019d288
-
Filesize
369KB
MD557bc85d5bf1d57b10501c77fcf3b8071
SHA164b568bc4dd2665a771952deac7258c720434642
SHA2568bc05953d4824417e5356562a99a25d577e8e204ceaf04a3c845f7fecaf3d8a0
SHA512af2dbe52beeb945391575c5ac19aea9d70b56434f59c569aca4fe6212dd3b93f995e6c430e5aa203e2b3e27095ab5837fa5f748a01b75ab2a74f7ea536a1db4e
-
Filesize
369KB
MD557bc85d5bf1d57b10501c77fcf3b8071
SHA164b568bc4dd2665a771952deac7258c720434642
SHA2568bc05953d4824417e5356562a99a25d577e8e204ceaf04a3c845f7fecaf3d8a0
SHA512af2dbe52beeb945391575c5ac19aea9d70b56434f59c569aca4fe6212dd3b93f995e6c430e5aa203e2b3e27095ab5837fa5f748a01b75ab2a74f7ea536a1db4e