Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/04/2023, 21:44

General

  • Target

    20a43c0d829e609bdae1ba53962f9ba763c61c3659f788db6d388ecb814e684b.exe

  • Size

    695KB

  • MD5

    d4d362616a2f8d17809720991a62010a

  • SHA1

    2c2ef026cf9ceb3f4ecc035df312bfc16c8d47a8

  • SHA256

    20a43c0d829e609bdae1ba53962f9ba763c61c3659f788db6d388ecb814e684b

  • SHA512

    fb36ab95a16cf80c17e35f571fcd71b04b4f141686746bd11b87b852d92e50c49d5bcab74ad91652a9194199ae8ef6c984b9c29f0e6fd4fd710294df66c7690f

  • SSDEEP

    12288:Ny90pkASIj0uh8mP3H8xQAaXfy7vzxy7RqZSbZe+qpCoLGe:Ny9puvP3xAaUyFbZbW

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20a43c0d829e609bdae1ba53962f9ba763c61c3659f788db6d388ecb814e684b.exe
    "C:\Users\Admin\AppData\Local\Temp\20a43c0d829e609bdae1ba53962f9ba763c61c3659f788db6d388ecb814e684b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un511201.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un511201.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\74450905.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\74450905.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3776
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 1084
          4⤵
          • Program crash
          PID:4056
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk295542.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk295542.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4332
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 1332
          4⤵
          • Program crash
          PID:3424
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si739964.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si739964.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4320
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3776 -ip 3776
    1⤵
      PID:5088
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4332 -ip 4332
      1⤵
        PID:2956

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si739964.exe

        Filesize

        136KB

        MD5

        73cae2858379cab7e68b9e5bf751c372

        SHA1

        38c375354bda6e5c8fb2579f1ef0416a6c65929a

        SHA256

        e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

        SHA512

        343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si739964.exe

        Filesize

        136KB

        MD5

        73cae2858379cab7e68b9e5bf751c372

        SHA1

        38c375354bda6e5c8fb2579f1ef0416a6c65929a

        SHA256

        e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

        SHA512

        343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un511201.exe

        Filesize

        541KB

        MD5

        0e2c822bc311cfe83c77ee8dab73b49d

        SHA1

        b58b46a268def98d60a3726eff9af3f07cce0841

        SHA256

        9023104903a2b87c14241390778b92772b87852a3e5ba1a27dda6dcff88ce642

        SHA512

        9e5c31ac948559c9d681a612a69f33e2745cdf8d40afd63390fa34fc02d06f85bf27e370c1f7e0296c0c766fca1daaa0c06d2e0e0871f73d6e220dc01a1082ea

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un511201.exe

        Filesize

        541KB

        MD5

        0e2c822bc311cfe83c77ee8dab73b49d

        SHA1

        b58b46a268def98d60a3726eff9af3f07cce0841

        SHA256

        9023104903a2b87c14241390778b92772b87852a3e5ba1a27dda6dcff88ce642

        SHA512

        9e5c31ac948559c9d681a612a69f33e2745cdf8d40afd63390fa34fc02d06f85bf27e370c1f7e0296c0c766fca1daaa0c06d2e0e0871f73d6e220dc01a1082ea

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\74450905.exe

        Filesize

        257KB

        MD5

        e085f97a441749f0a499aad0b952d16e

        SHA1

        62eb3c8c23d75f28ab489ab80f67eaa8c91bb7d9

        SHA256

        4eb21dad23e53f62ce2e14d498d43123c85fb1a0112009a269f3f475f063f4b9

        SHA512

        dce4143eb3ef68162d91753f5ebe522d641d9d752119af0f2126b10d315be7513f3934de0d0dea7be864acb5bb592af8d687d89ffce7ed6830597726b7d2eaba

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\74450905.exe

        Filesize

        257KB

        MD5

        e085f97a441749f0a499aad0b952d16e

        SHA1

        62eb3c8c23d75f28ab489ab80f67eaa8c91bb7d9

        SHA256

        4eb21dad23e53f62ce2e14d498d43123c85fb1a0112009a269f3f475f063f4b9

        SHA512

        dce4143eb3ef68162d91753f5ebe522d641d9d752119af0f2126b10d315be7513f3934de0d0dea7be864acb5bb592af8d687d89ffce7ed6830597726b7d2eaba

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk295542.exe

        Filesize

        340KB

        MD5

        98f9abbfcdb1f8585ab799224b605bbe

        SHA1

        435cde6649fb4aafa9a18139862e3ffa2ec3d054

        SHA256

        febfd881946c79a394d95b8e0064c6c3dffb9a101f68274fb0e76add9c0ff1c2

        SHA512

        fe1facfb722d9ad7f25caa79824f5f6a4f4c4b188d4b7761ff065241be6d70d808ec5b769d3aa95383225696cf9a94d6fc1b4d2a1a0380c4c1141fbb4e5cbf2a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk295542.exe

        Filesize

        340KB

        MD5

        98f9abbfcdb1f8585ab799224b605bbe

        SHA1

        435cde6649fb4aafa9a18139862e3ffa2ec3d054

        SHA256

        febfd881946c79a394d95b8e0064c6c3dffb9a101f68274fb0e76add9c0ff1c2

        SHA512

        fe1facfb722d9ad7f25caa79824f5f6a4f4c4b188d4b7761ff065241be6d70d808ec5b769d3aa95383225696cf9a94d6fc1b4d2a1a0380c4c1141fbb4e5cbf2a

      • memory/3776-161-0x0000000004E10000-0x0000000004E23000-memory.dmp

        Filesize

        76KB

      • memory/3776-171-0x0000000004E10000-0x0000000004E23000-memory.dmp

        Filesize

        76KB

      • memory/3776-151-0x0000000004E10000-0x0000000004E23000-memory.dmp

        Filesize

        76KB

      • memory/3776-150-0x0000000004E10000-0x0000000004E23000-memory.dmp

        Filesize

        76KB

      • memory/3776-153-0x0000000004E10000-0x0000000004E23000-memory.dmp

        Filesize

        76KB

      • memory/3776-155-0x0000000004E10000-0x0000000004E23000-memory.dmp

        Filesize

        76KB

      • memory/3776-157-0x0000000004E10000-0x0000000004E23000-memory.dmp

        Filesize

        76KB

      • memory/3776-159-0x0000000004E10000-0x0000000004E23000-memory.dmp

        Filesize

        76KB

      • memory/3776-148-0x0000000002BE0000-0x0000000002C0D000-memory.dmp

        Filesize

        180KB

      • memory/3776-163-0x0000000004E10000-0x0000000004E23000-memory.dmp

        Filesize

        76KB

      • memory/3776-165-0x0000000004E10000-0x0000000004E23000-memory.dmp

        Filesize

        76KB

      • memory/3776-167-0x0000000004E10000-0x0000000004E23000-memory.dmp

        Filesize

        76KB

      • memory/3776-169-0x0000000004E10000-0x0000000004E23000-memory.dmp

        Filesize

        76KB

      • memory/3776-149-0x0000000007440000-0x00000000079E4000-memory.dmp

        Filesize

        5.6MB

      • memory/3776-173-0x0000000004E10000-0x0000000004E23000-memory.dmp

        Filesize

        76KB

      • memory/3776-175-0x0000000004E10000-0x0000000004E23000-memory.dmp

        Filesize

        76KB

      • memory/3776-177-0x0000000004E10000-0x0000000004E23000-memory.dmp

        Filesize

        76KB

      • memory/3776-178-0x0000000007430000-0x0000000007440000-memory.dmp

        Filesize

        64KB

      • memory/3776-179-0x0000000007430000-0x0000000007440000-memory.dmp

        Filesize

        64KB

      • memory/3776-180-0x0000000000400000-0x0000000002B9B000-memory.dmp

        Filesize

        39.6MB

      • memory/3776-181-0x0000000002BE0000-0x0000000002C0D000-memory.dmp

        Filesize

        180KB

      • memory/3776-183-0x0000000007430000-0x0000000007440000-memory.dmp

        Filesize

        64KB

      • memory/3776-185-0x0000000007430000-0x0000000007440000-memory.dmp

        Filesize

        64KB

      • memory/3776-184-0x0000000007430000-0x0000000007440000-memory.dmp

        Filesize

        64KB

      • memory/3776-186-0x0000000000400000-0x0000000002B9B000-memory.dmp

        Filesize

        39.6MB

      • memory/4320-1009-0x00000000008E0000-0x0000000000908000-memory.dmp

        Filesize

        160KB

      • memory/4320-1010-0x0000000007A20000-0x0000000007A30000-memory.dmp

        Filesize

        64KB

      • memory/4332-193-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

        Filesize

        212KB

      • memory/4332-223-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

        Filesize

        212KB

      • memory/4332-197-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

        Filesize

        212KB

      • memory/4332-199-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

        Filesize

        212KB

      • memory/4332-201-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

        Filesize

        212KB

      • memory/4332-203-0x0000000002CC0000-0x0000000002D06000-memory.dmp

        Filesize

        280KB

      • memory/4332-206-0x0000000004970000-0x0000000004980000-memory.dmp

        Filesize

        64KB

      • memory/4332-204-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

        Filesize

        212KB

      • memory/4332-207-0x0000000004970000-0x0000000004980000-memory.dmp

        Filesize

        64KB

      • memory/4332-209-0x0000000004970000-0x0000000004980000-memory.dmp

        Filesize

        64KB

      • memory/4332-208-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

        Filesize

        212KB

      • memory/4332-211-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

        Filesize

        212KB

      • memory/4332-213-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

        Filesize

        212KB

      • memory/4332-215-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

        Filesize

        212KB

      • memory/4332-217-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

        Filesize

        212KB

      • memory/4332-219-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

        Filesize

        212KB

      • memory/4332-221-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

        Filesize

        212KB

      • memory/4332-195-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

        Filesize

        212KB

      • memory/4332-225-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

        Filesize

        212KB

      • memory/4332-227-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

        Filesize

        212KB

      • memory/4332-988-0x0000000009DE0000-0x000000000A3F8000-memory.dmp

        Filesize

        6.1MB

      • memory/4332-989-0x0000000004B80000-0x0000000004B92000-memory.dmp

        Filesize

        72KB

      • memory/4332-990-0x000000000A400000-0x000000000A50A000-memory.dmp

        Filesize

        1.0MB

      • memory/4332-991-0x0000000004DB0000-0x0000000004DEC000-memory.dmp

        Filesize

        240KB

      • memory/4332-992-0x0000000004970000-0x0000000004980000-memory.dmp

        Filesize

        64KB

      • memory/4332-993-0x000000000A740000-0x000000000A7A6000-memory.dmp

        Filesize

        408KB

      • memory/4332-994-0x000000000AE00000-0x000000000AE92000-memory.dmp

        Filesize

        584KB

      • memory/4332-995-0x000000000AED0000-0x000000000AF46000-memory.dmp

        Filesize

        472KB

      • memory/4332-997-0x000000000AFB0000-0x000000000B172000-memory.dmp

        Filesize

        1.8MB

      • memory/4332-998-0x000000000B180000-0x000000000B6AC000-memory.dmp

        Filesize

        5.2MB

      • memory/4332-999-0x000000000B730000-0x000000000B74E000-memory.dmp

        Filesize

        120KB

      • memory/4332-1000-0x0000000004970000-0x0000000004980000-memory.dmp

        Filesize

        64KB

      • memory/4332-192-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

        Filesize

        212KB

      • memory/4332-1001-0x0000000004970000-0x0000000004980000-memory.dmp

        Filesize

        64KB

      • memory/4332-1002-0x00000000047F0000-0x0000000004840000-memory.dmp

        Filesize

        320KB

      • memory/4332-1004-0x0000000004970000-0x0000000004980000-memory.dmp

        Filesize

        64KB