Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/04/2023, 19:49

General

  • Target

    a390aaaea01d1a7d8deb61709d8b68f722815dab67abd8682b722c007f2f7882.exe

  • Size

    703KB

  • MD5

    46985f563763312cba830129a7c002eb

  • SHA1

    260b8c38fecbb4ccb97166da73136b45046d6552

  • SHA256

    a390aaaea01d1a7d8deb61709d8b68f722815dab67abd8682b722c007f2f7882

  • SHA512

    9c5727963872b1c9b42f5fc05c6a741e7605f452895c9283c4088f71b609ae5ce182200239a043d93cdf412f595b842562c5dcb0e886bb681d531c10c7c300ed

  • SSDEEP

    12288:iy90l4c8RkMf0sxmSvp0HBGlqoDWfU7t3Yr3Fy5jqEFXFD050rXea/imt65fKOj:iy/Zf8kmG0z4L7Fm05jqEFVDnOxmU5fZ

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a390aaaea01d1a7d8deb61709d8b68f722815dab67abd8682b722c007f2f7882.exe
    "C:\Users\Admin\AppData\Local\Temp\a390aaaea01d1a7d8deb61709d8b68f722815dab67abd8682b722c007f2f7882.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un453029.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un453029.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2572
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr122223.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr122223.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4940
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4940 -s 1080
          4⤵
          • Program crash
          PID:5100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu834842.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu834842.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:380
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 1348
          4⤵
          • Program crash
          PID:3840
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si769374.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si769374.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4188
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4940 -ip 4940
    1⤵
      PID:3860
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 380 -ip 380
      1⤵
        PID:4124

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si769374.exe

        Filesize

        136KB

        MD5

        8c80b06d843bd6a7599a5be2075d9a55

        SHA1

        caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

        SHA256

        e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

        SHA512

        cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si769374.exe

        Filesize

        136KB

        MD5

        8c80b06d843bd6a7599a5be2075d9a55

        SHA1

        caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

        SHA256

        e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

        SHA512

        cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un453029.exe

        Filesize

        549KB

        MD5

        920a8600ce84b33ffc7da229635c454f

        SHA1

        6a021d0e0ea4960ef43038a42ddd15c16516993e

        SHA256

        9cd413d27d1d6e0da17819348bcd469dd39dff4f8f322f6f91868f8fc0a26031

        SHA512

        29e14fc5e45081fa2bf55c09dc460cd725e7224dfcac247f242ea8a1ec8384f972af73982b6281350b0f1cb02d85ab212bf196157a4ee782aabbdd5fc060e993

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un453029.exe

        Filesize

        549KB

        MD5

        920a8600ce84b33ffc7da229635c454f

        SHA1

        6a021d0e0ea4960ef43038a42ddd15c16516993e

        SHA256

        9cd413d27d1d6e0da17819348bcd469dd39dff4f8f322f6f91868f8fc0a26031

        SHA512

        29e14fc5e45081fa2bf55c09dc460cd725e7224dfcac247f242ea8a1ec8384f972af73982b6281350b0f1cb02d85ab212bf196157a4ee782aabbdd5fc060e993

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr122223.exe

        Filesize

        278KB

        MD5

        97ce63218f17c8330b8552f07b9ebf43

        SHA1

        9a1a3480f77aa48c13c2e9b82e5d8cf14b0fd976

        SHA256

        9d82726800d119fd581100b24da5e60fd61455df8e2139d9e2db6f610498c460

        SHA512

        dde91df0d39bf6d4c556a8ce0d84cd071ae1d58e8efd05bcdab16549068162ea3e49cbbe45d9d43c50c41ce696cf5f64e696f872b61b96e8dc4e1824a9138672

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr122223.exe

        Filesize

        278KB

        MD5

        97ce63218f17c8330b8552f07b9ebf43

        SHA1

        9a1a3480f77aa48c13c2e9b82e5d8cf14b0fd976

        SHA256

        9d82726800d119fd581100b24da5e60fd61455df8e2139d9e2db6f610498c460

        SHA512

        dde91df0d39bf6d4c556a8ce0d84cd071ae1d58e8efd05bcdab16549068162ea3e49cbbe45d9d43c50c41ce696cf5f64e696f872b61b96e8dc4e1824a9138672

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu834842.exe

        Filesize

        360KB

        MD5

        c124a697e3f22de4ac5936158136e249

        SHA1

        ee4dc8d559d1120da4eca41088a4b49885c6ed0d

        SHA256

        105c25e93be2026113f1f46dbd68de22dfb903801bf7c13fc232e4fdacde9d73

        SHA512

        dee8bfd6db1169bcb5faa309c5bc0366f99106c7e96d84c8d77f99e7032d5bfafa54854783cd9cf153cdb7f64de35b4ae9a8c917a022f11b71ba5e8e992800c0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu834842.exe

        Filesize

        360KB

        MD5

        c124a697e3f22de4ac5936158136e249

        SHA1

        ee4dc8d559d1120da4eca41088a4b49885c6ed0d

        SHA256

        105c25e93be2026113f1f46dbd68de22dfb903801bf7c13fc232e4fdacde9d73

        SHA512

        dee8bfd6db1169bcb5faa309c5bc0366f99106c7e96d84c8d77f99e7032d5bfafa54854783cd9cf153cdb7f64de35b4ae9a8c917a022f11b71ba5e8e992800c0

      • memory/380-227-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/380-986-0x0000000009C70000-0x000000000A288000-memory.dmp

        Filesize

        6.1MB

      • memory/380-997-0x000000000B930000-0x000000000B94E000-memory.dmp

        Filesize

        120KB

      • memory/380-996-0x000000000B300000-0x000000000B82C000-memory.dmp

        Filesize

        5.2MB

      • memory/380-995-0x000000000B120000-0x000000000B2E2000-memory.dmp

        Filesize

        1.8MB

      • memory/380-994-0x000000000B040000-0x000000000B0B6000-memory.dmp

        Filesize

        472KB

      • memory/380-993-0x000000000AFF0000-0x000000000B040000-memory.dmp

        Filesize

        320KB

      • memory/380-992-0x000000000AE20000-0x000000000AEB2000-memory.dmp

        Filesize

        584KB

      • memory/380-991-0x000000000A760000-0x000000000A7C6000-memory.dmp

        Filesize

        408KB

      • memory/380-990-0x00000000071F0000-0x0000000007200000-memory.dmp

        Filesize

        64KB

      • memory/380-989-0x000000000A460000-0x000000000A49C000-memory.dmp

        Filesize

        240KB

      • memory/380-988-0x000000000A340000-0x000000000A44A000-memory.dmp

        Filesize

        1.0MB

      • memory/380-987-0x000000000A320000-0x000000000A332000-memory.dmp

        Filesize

        72KB

      • memory/380-225-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/380-223-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/380-221-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/380-219-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/380-217-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/380-215-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/380-213-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/380-211-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/380-209-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/380-207-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/380-191-0x0000000002BE0000-0x0000000002C26000-memory.dmp

        Filesize

        280KB

      • memory/380-192-0x00000000071F0000-0x0000000007200000-memory.dmp

        Filesize

        64KB

      • memory/380-193-0x00000000071F0000-0x0000000007200000-memory.dmp

        Filesize

        64KB

      • memory/380-194-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/380-195-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/380-197-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/380-199-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/380-201-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/380-203-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/380-205-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/4188-1004-0x0000000000CA0000-0x0000000000CC8000-memory.dmp

        Filesize

        160KB

      • memory/4188-1005-0x0000000007DF0000-0x0000000007E00000-memory.dmp

        Filesize

        64KB

      • memory/4940-177-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/4940-149-0x0000000007140000-0x00000000076E4000-memory.dmp

        Filesize

        5.6MB

      • memory/4940-184-0x0000000007130000-0x0000000007140000-memory.dmp

        Filesize

        64KB

      • memory/4940-183-0x0000000007130000-0x0000000007140000-memory.dmp

        Filesize

        64KB

      • memory/4940-181-0x0000000000400000-0x0000000002BAF000-memory.dmp

        Filesize

        39.7MB

      • memory/4940-180-0x0000000007130000-0x0000000007140000-memory.dmp

        Filesize

        64KB

      • memory/4940-179-0x0000000007130000-0x0000000007140000-memory.dmp

        Filesize

        64KB

      • memory/4940-178-0x0000000007130000-0x0000000007140000-memory.dmp

        Filesize

        64KB

      • memory/4940-150-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/4940-155-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/4940-151-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/4940-175-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/4940-185-0x0000000007130000-0x0000000007140000-memory.dmp

        Filesize

        64KB

      • memory/4940-169-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/4940-173-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/4940-167-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/4940-165-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/4940-163-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/4940-161-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/4940-159-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/4940-157-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/4940-171-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/4940-148-0x0000000002C80000-0x0000000002CAD000-memory.dmp

        Filesize

        180KB

      • memory/4940-186-0x0000000000400000-0x0000000002BAF000-memory.dmp

        Filesize

        39.7MB

      • memory/4940-153-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB