Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
62s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2023, 11:18
Static task
static1
General
-
Target
b60d996062d1f8ab304a751ceb3a69e4802311273c020d74be4e2d85a538d13f.exe
-
Size
705KB
-
MD5
4f8181e74776ed9e1a4bdcdab364eba8
-
SHA1
4f0c5ba0c3f941dcdf54c7db93e1f6a22371c042
-
SHA256
b60d996062d1f8ab304a751ceb3a69e4802311273c020d74be4e2d85a538d13f
-
SHA512
1cdbd14c6e9e8655973af8fc2411d098daf3ae9fdd8f116e76cb7e6f7748474e6e2124e417c999fed8c1f99c5d9ad7e9d329702752463cfbeca7309fc1e954ac
-
SSDEEP
12288:Gy905daqWA6tuf7YZUt4xBZM5nfzQR8vLb1g23oyzPmZhedd0R7JQGf:Gygdaqv6tU6UtZ5fzI8vLbRYyGh0ChJJ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr048289.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr048289.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr048289.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr048289.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr048289.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr048289.exe -
Executes dropped EXE 4 IoCs
pid Process 4132 un728014.exe 524 pr048289.exe 3188 qu807307.exe 2880 si552953.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr048289.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr048289.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b60d996062d1f8ab304a751ceb3a69e4802311273c020d74be4e2d85a538d13f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b60d996062d1f8ab304a751ceb3a69e4802311273c020d74be4e2d85a538d13f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un728014.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un728014.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 520 524 WerFault.exe 85 3780 3188 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 524 pr048289.exe 524 pr048289.exe 3188 qu807307.exe 3188 qu807307.exe 2880 si552953.exe 2880 si552953.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 524 pr048289.exe Token: SeDebugPrivilege 3188 qu807307.exe Token: SeDebugPrivilege 2880 si552953.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2028 wrote to memory of 4132 2028 b60d996062d1f8ab304a751ceb3a69e4802311273c020d74be4e2d85a538d13f.exe 84 PID 2028 wrote to memory of 4132 2028 b60d996062d1f8ab304a751ceb3a69e4802311273c020d74be4e2d85a538d13f.exe 84 PID 2028 wrote to memory of 4132 2028 b60d996062d1f8ab304a751ceb3a69e4802311273c020d74be4e2d85a538d13f.exe 84 PID 4132 wrote to memory of 524 4132 un728014.exe 85 PID 4132 wrote to memory of 524 4132 un728014.exe 85 PID 4132 wrote to memory of 524 4132 un728014.exe 85 PID 4132 wrote to memory of 3188 4132 un728014.exe 94 PID 4132 wrote to memory of 3188 4132 un728014.exe 94 PID 4132 wrote to memory of 3188 4132 un728014.exe 94 PID 2028 wrote to memory of 2880 2028 b60d996062d1f8ab304a751ceb3a69e4802311273c020d74be4e2d85a538d13f.exe 97 PID 2028 wrote to memory of 2880 2028 b60d996062d1f8ab304a751ceb3a69e4802311273c020d74be4e2d85a538d13f.exe 97 PID 2028 wrote to memory of 2880 2028 b60d996062d1f8ab304a751ceb3a69e4802311273c020d74be4e2d85a538d13f.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\b60d996062d1f8ab304a751ceb3a69e4802311273c020d74be4e2d85a538d13f.exe"C:\Users\Admin\AppData\Local\Temp\b60d996062d1f8ab304a751ceb3a69e4802311273c020d74be4e2d85a538d13f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un728014.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un728014.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr048289.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr048289.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 10844⤵
- Program crash
PID:520
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu807307.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu807307.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3188 -s 11444⤵
- Program crash
PID:3780
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si552953.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si552953.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 524 -ip 5241⤵PID:3900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3188 -ip 31881⤵PID:5020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
136KB
MD58c80b06d843bd6a7599a5be2075d9a55
SHA1caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2
SHA256e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e
SHA512cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded
-
Filesize
551KB
MD52067aca5fa8d00d4e412a720351006bc
SHA153c54056c77284191896a222957ba8b64e1f99f9
SHA256c4287066f6f1c0954c882689da5eb4b792c24962413d18979c652791c963f236
SHA51235a6dbe3b97e0e4fe8e99e15b828cfe467fa2267f459609af0b1e7e9814c93cb014929de1a2cd9e527f3608155e73e8b8f10ca0d81cf9799666021667f2dde45
-
Filesize
551KB
MD52067aca5fa8d00d4e412a720351006bc
SHA153c54056c77284191896a222957ba8b64e1f99f9
SHA256c4287066f6f1c0954c882689da5eb4b792c24962413d18979c652791c963f236
SHA51235a6dbe3b97e0e4fe8e99e15b828cfe467fa2267f459609af0b1e7e9814c93cb014929de1a2cd9e527f3608155e73e8b8f10ca0d81cf9799666021667f2dde45
-
Filesize
286KB
MD58e0d3ca44386def19279efa5d914faee
SHA18b56113d883475b988d937d8a013749becd1de67
SHA25669c383eae6c44f5f5327623f9ccb6e88cb5da779508062d1541141efb9135f97
SHA512d288e987115075eca21acdef937dcd5ea708bea282c5d555dbef9cee35f544d0b6b01b6fba1f378670b40eeb280ce7c8d337b6eaf122e0c5fad2a362ffb6fd8b
-
Filesize
286KB
MD58e0d3ca44386def19279efa5d914faee
SHA18b56113d883475b988d937d8a013749becd1de67
SHA25669c383eae6c44f5f5327623f9ccb6e88cb5da779508062d1541141efb9135f97
SHA512d288e987115075eca21acdef937dcd5ea708bea282c5d555dbef9cee35f544d0b6b01b6fba1f378670b40eeb280ce7c8d337b6eaf122e0c5fad2a362ffb6fd8b
-
Filesize
369KB
MD50e6afa369fe0c100041992aca210cf80
SHA16a3d34612ed1df46ebaf1e6439d32c0ad9da8d8f
SHA2564b646952f81021e620cd6c376a678f17a1ca81405f6789ad65d69ce5a3ecfdd5
SHA512aa9de5587343926f7eeaa999beb3c507232bd62d6e8273ada8edfa34af9619a9922bf00cc2bb4ebe3baac6b603db58d28c507be49db2df911a8ccace4e45a6c5
-
Filesize
369KB
MD50e6afa369fe0c100041992aca210cf80
SHA16a3d34612ed1df46ebaf1e6439d32c0ad9da8d8f
SHA2564b646952f81021e620cd6c376a678f17a1ca81405f6789ad65d69ce5a3ecfdd5
SHA512aa9de5587343926f7eeaa999beb3c507232bd62d6e8273ada8edfa34af9619a9922bf00cc2bb4ebe3baac6b603db58d28c507be49db2df911a8ccace4e45a6c5