Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    82s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/04/2023, 12:35

General

  • Target

    c14b1271b459b6e09689a254d3c8cc7c0016e8c3de024723d24590cc75e739db.exe

  • Size

    752KB

  • MD5

    41ba94944b619d14810e8bb046f3fbc0

  • SHA1

    9cdaa9ee435ed6a5d50c2c560dadf11082400de1

  • SHA256

    c14b1271b459b6e09689a254d3c8cc7c0016e8c3de024723d24590cc75e739db

  • SHA512

    144cf275d3847f7ff3c3cbb310bcb6632f238201933823c2c7eea9ec23fc6997387b779778f35ceb251e6cc1220b10cedc710d2c26aa2ee9620420cd1f5b42e4

  • SSDEEP

    12288:Ay90TDaobuQtAf4jZyilC3urW/K7Ye+KhTXnOCgOQM2:Ay62KuQWf6FW/K7YxKhTXOCGj

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c14b1271b459b6e09689a254d3c8cc7c0016e8c3de024723d24590cc75e739db.exe
    "C:\Users\Admin\AppData\Local\Temp\c14b1271b459b6e09689a254d3c8cc7c0016e8c3de024723d24590cc75e739db.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3444
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un275000.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un275000.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1648
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73216928.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73216928.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:616
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk716503.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk716503.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3964
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si745993.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si745993.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1424

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si745993.exe

    Filesize

    136KB

    MD5

    ace73b2b1f835de11594ea9a243a9f5c

    SHA1

    2f929d1f69784fbe499a95b064679a16947bdd84

    SHA256

    7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

    SHA512

    024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si745993.exe

    Filesize

    136KB

    MD5

    ace73b2b1f835de11594ea9a243a9f5c

    SHA1

    2f929d1f69784fbe499a95b064679a16947bdd84

    SHA256

    7310c28dc6a24530885da07d08c851b4a6c5aa987d2a44ce53cb73e72235fa49

    SHA512

    024e1ce3ab37e27c8647d02f79c434e103a84265c97b4773aed1a0b1fd3e8228eab560fc9b6f53b0132575ea855d1da0cd0b6b6e5cd2965f841cf8551c7d138e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un275000.exe

    Filesize

    598KB

    MD5

    e50b22c8b3dbf63d4241e17b81d117f7

    SHA1

    ca4eefdd271b182321ab437dc4c942f724607b3c

    SHA256

    9b72cb758b38b4da57efef2b11d0123ef4def543d534a0b871298c5a2d772942

    SHA512

    40c46bdbedd248456359dcf0dc10d2ea9664860324b91e052ac9df87c64c20911232a5a2a54b42b6dbcd0052bc012a8aa194c9f44fb66876701837240516b8c3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un275000.exe

    Filesize

    598KB

    MD5

    e50b22c8b3dbf63d4241e17b81d117f7

    SHA1

    ca4eefdd271b182321ab437dc4c942f724607b3c

    SHA256

    9b72cb758b38b4da57efef2b11d0123ef4def543d534a0b871298c5a2d772942

    SHA512

    40c46bdbedd248456359dcf0dc10d2ea9664860324b91e052ac9df87c64c20911232a5a2a54b42b6dbcd0052bc012a8aa194c9f44fb66876701837240516b8c3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73216928.exe

    Filesize

    390KB

    MD5

    659f79f368d29a5795791aea808626e6

    SHA1

    9bad21d6fcad43ec9028d7f6354ea2f491060011

    SHA256

    50ed633d56f32cb8f594629649b34dbf314133d21cf0c22757064ecf7fe55f33

    SHA512

    b7bc46ded9bfc80d19b2a1e3e0cf0e4626c614f71fbad6437efc0c266459337531e178fe98c5b0a518f2843e5f53cb368f6c45c3af750426e0430e478547ca52

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73216928.exe

    Filesize

    390KB

    MD5

    659f79f368d29a5795791aea808626e6

    SHA1

    9bad21d6fcad43ec9028d7f6354ea2f491060011

    SHA256

    50ed633d56f32cb8f594629649b34dbf314133d21cf0c22757064ecf7fe55f33

    SHA512

    b7bc46ded9bfc80d19b2a1e3e0cf0e4626c614f71fbad6437efc0c266459337531e178fe98c5b0a518f2843e5f53cb368f6c45c3af750426e0430e478547ca52

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk716503.exe

    Filesize

    473KB

    MD5

    70f17e6779ec33c346e1210bf8438f4c

    SHA1

    83a1d10a124e757e054bd46c15864cec0908b34c

    SHA256

    a9565a1de27d3534a94d98e7a7a31af976f2a4f3f7be94553b489448e0174f08

    SHA512

    9727a201a6dcb7d54ec8a7a7895e63ec40cabfd82c30aefd379332a7b5905aa8cb4d4b0dac6950905f116dfce9aacec1f10f8f93766152459e626318617d4b69

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk716503.exe

    Filesize

    473KB

    MD5

    70f17e6779ec33c346e1210bf8438f4c

    SHA1

    83a1d10a124e757e054bd46c15864cec0908b34c

    SHA256

    a9565a1de27d3534a94d98e7a7a31af976f2a4f3f7be94553b489448e0174f08

    SHA512

    9727a201a6dcb7d54ec8a7a7895e63ec40cabfd82c30aefd379332a7b5905aa8cb4d4b0dac6950905f116dfce9aacec1f10f8f93766152459e626318617d4b69

  • memory/616-158-0x0000000002780000-0x0000000002792000-memory.dmp

    Filesize

    72KB

  • memory/616-168-0x0000000002780000-0x0000000002792000-memory.dmp

    Filesize

    72KB

  • memory/616-150-0x0000000005000000-0x0000000005010000-memory.dmp

    Filesize

    64KB

  • memory/616-151-0x0000000005000000-0x0000000005010000-memory.dmp

    Filesize

    64KB

  • memory/616-152-0x0000000005000000-0x0000000005010000-memory.dmp

    Filesize

    64KB

  • memory/616-153-0x0000000002780000-0x0000000002792000-memory.dmp

    Filesize

    72KB

  • memory/616-154-0x0000000002780000-0x0000000002792000-memory.dmp

    Filesize

    72KB

  • memory/616-156-0x0000000002780000-0x0000000002792000-memory.dmp

    Filesize

    72KB

  • memory/616-148-0x0000000005010000-0x00000000055B4000-memory.dmp

    Filesize

    5.6MB

  • memory/616-160-0x0000000002780000-0x0000000002792000-memory.dmp

    Filesize

    72KB

  • memory/616-162-0x0000000002780000-0x0000000002792000-memory.dmp

    Filesize

    72KB

  • memory/616-164-0x0000000002780000-0x0000000002792000-memory.dmp

    Filesize

    72KB

  • memory/616-166-0x0000000002780000-0x0000000002792000-memory.dmp

    Filesize

    72KB

  • memory/616-149-0x0000000000930000-0x000000000095D000-memory.dmp

    Filesize

    180KB

  • memory/616-170-0x0000000002780000-0x0000000002792000-memory.dmp

    Filesize

    72KB

  • memory/616-172-0x0000000002780000-0x0000000002792000-memory.dmp

    Filesize

    72KB

  • memory/616-174-0x0000000002780000-0x0000000002792000-memory.dmp

    Filesize

    72KB

  • memory/616-176-0x0000000002780000-0x0000000002792000-memory.dmp

    Filesize

    72KB

  • memory/616-178-0x0000000002780000-0x0000000002792000-memory.dmp

    Filesize

    72KB

  • memory/616-180-0x0000000002780000-0x0000000002792000-memory.dmp

    Filesize

    72KB

  • memory/616-181-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/616-182-0x0000000005000000-0x0000000005010000-memory.dmp

    Filesize

    64KB

  • memory/616-183-0x0000000005000000-0x0000000005010000-memory.dmp

    Filesize

    64KB

  • memory/616-184-0x0000000005000000-0x0000000005010000-memory.dmp

    Filesize

    64KB

  • memory/616-186-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/1424-1004-0x0000000000520000-0x0000000000548000-memory.dmp

    Filesize

    160KB

  • memory/1424-1005-0x00000000075E0000-0x00000000075F0000-memory.dmp

    Filesize

    64KB

  • memory/3964-191-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/3964-194-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/3964-195-0x0000000002430000-0x0000000002476000-memory.dmp

    Filesize

    280KB

  • memory/3964-197-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/3964-199-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/3964-198-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/3964-202-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/3964-200-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/3964-204-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/3964-206-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/3964-208-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/3964-210-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/3964-212-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/3964-214-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/3964-216-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/3964-218-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/3964-220-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/3964-222-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/3964-224-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/3964-226-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/3964-228-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/3964-987-0x0000000007920000-0x0000000007F38000-memory.dmp

    Filesize

    6.1MB

  • memory/3964-988-0x0000000007F70000-0x0000000007F82000-memory.dmp

    Filesize

    72KB

  • memory/3964-989-0x0000000007F90000-0x000000000809A000-memory.dmp

    Filesize

    1.0MB

  • memory/3964-990-0x00000000080B0000-0x00000000080EC000-memory.dmp

    Filesize

    240KB

  • memory/3964-991-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/3964-992-0x00000000083B0000-0x0000000008416000-memory.dmp

    Filesize

    408KB

  • memory/3964-993-0x0000000008A80000-0x0000000008B12000-memory.dmp

    Filesize

    584KB

  • memory/3964-994-0x0000000008C40000-0x0000000008CB6000-memory.dmp

    Filesize

    472KB

  • memory/3964-995-0x0000000008D10000-0x0000000008ED2000-memory.dmp

    Filesize

    1.8MB

  • memory/3964-192-0x0000000004DF0000-0x0000000004E25000-memory.dmp

    Filesize

    212KB

  • memory/3964-996-0x0000000008EF0000-0x000000000941C000-memory.dmp

    Filesize

    5.2MB

  • memory/3964-997-0x00000000094A0000-0x00000000094BE000-memory.dmp

    Filesize

    120KB

  • memory/3964-998-0x00000000026F0000-0x0000000002740000-memory.dmp

    Filesize

    320KB