Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    54s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25/04/2023, 21:56

General

  • Target

    c187eddaa4a16be54cf3550e4b3451573eb7f6433ea15c1748bef6e81c132456.exe

  • Size

    695KB

  • MD5

    a8709c5161ec9e1e1942deac36812edb

  • SHA1

    cc95d4c90c83eb13ae4ecae8cdf4d064c1706e1b

  • SHA256

    c187eddaa4a16be54cf3550e4b3451573eb7f6433ea15c1748bef6e81c132456

  • SHA512

    1e970cfde4771230e333a2208f6e948258bc09115042b5066c02887a5fe1f875cd4cbabf2e72a0af9c95764de0ff5fb3f73402439e330c5c9f0764eb9f0a0a47

  • SSDEEP

    12288:Ty90nsYfeQySdHbMcX8nMOqQTDj7XS83XxFdOqHSbZeSN0z1QggBsv:TyOlXymHbMcoGCDjGkFsbZoCggB0

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c187eddaa4a16be54cf3550e4b3451573eb7f6433ea15c1748bef6e81c132456.exe
    "C:\Users\Admin\AppData\Local\Temp\c187eddaa4a16be54cf3550e4b3451573eb7f6433ea15c1748bef6e81c132456.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un553868.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un553868.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\24466237.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\24466237.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2348
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk896088.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk896088.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1472
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si436750.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si436750.exe
      2⤵
      • Executes dropped EXE
      PID:2892

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si436750.exe

    Filesize

    136KB

    MD5

    73cae2858379cab7e68b9e5bf751c372

    SHA1

    38c375354bda6e5c8fb2579f1ef0416a6c65929a

    SHA256

    e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

    SHA512

    343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un553868.exe

    Filesize

    541KB

    MD5

    a1143f6de5ee62d773e908f1e5721323

    SHA1

    41ce1778d6c7a7899394a7365bd8e4c741fe8dcc

    SHA256

    71899819fbbdd32fc9c9ccad644cd9b035fd59caeba65372176dfd1663715fb4

    SHA512

    f168bbab9322a8ea3120d63cdf8e17c65102a9a8a1ee1c84705303d94960d33b480a722a4c203313149dbb830b1fe72bb65e6ffcc3b7faba2cecfc0073ff90d8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un553868.exe

    Filesize

    541KB

    MD5

    a1143f6de5ee62d773e908f1e5721323

    SHA1

    41ce1778d6c7a7899394a7365bd8e4c741fe8dcc

    SHA256

    71899819fbbdd32fc9c9ccad644cd9b035fd59caeba65372176dfd1663715fb4

    SHA512

    f168bbab9322a8ea3120d63cdf8e17c65102a9a8a1ee1c84705303d94960d33b480a722a4c203313149dbb830b1fe72bb65e6ffcc3b7faba2cecfc0073ff90d8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\24466237.exe

    Filesize

    257KB

    MD5

    dcf8f2710e47083fce7e08c434d9fec3

    SHA1

    673890ec3e5d23b7b8dddcf5b2ea6ab32eb86bd3

    SHA256

    e14a918545771a45e664d2ff7e235a72eacb2602491b54078f07fd6a492fba5e

    SHA512

    056e3c6ddc8cfba1b9e7ac6063011e13feab3f48be738f99477a2cfb7e79669d880780c290ec5c1f4980e9ca2b34758632c95b1f7c1e31fa16691aab5778994e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\24466237.exe

    Filesize

    257KB

    MD5

    dcf8f2710e47083fce7e08c434d9fec3

    SHA1

    673890ec3e5d23b7b8dddcf5b2ea6ab32eb86bd3

    SHA256

    e14a918545771a45e664d2ff7e235a72eacb2602491b54078f07fd6a492fba5e

    SHA512

    056e3c6ddc8cfba1b9e7ac6063011e13feab3f48be738f99477a2cfb7e79669d880780c290ec5c1f4980e9ca2b34758632c95b1f7c1e31fa16691aab5778994e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk896088.exe

    Filesize

    340KB

    MD5

    7504600869427a64c14a149a71d16db0

    SHA1

    9afed684011a2381cf1e06fbc79708eac1645be8

    SHA256

    53355d2fd6ecb9d5317df484289a5b3faa497ef14ab14e492c4da9d045a865ee

    SHA512

    26d0592201139c033cc37fbd3d0523d2adbfe39aca27933a1c9372c411700f997282b423595e85a32aa56a2076f8a046d9d47ebce7f07669e4fb8efb6b0e92ac

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk896088.exe

    Filesize

    340KB

    MD5

    7504600869427a64c14a149a71d16db0

    SHA1

    9afed684011a2381cf1e06fbc79708eac1645be8

    SHA256

    53355d2fd6ecb9d5317df484289a5b3faa497ef14ab14e492c4da9d045a865ee

    SHA512

    26d0592201139c033cc37fbd3d0523d2adbfe39aca27933a1c9372c411700f997282b423595e85a32aa56a2076f8a046d9d47ebce7f07669e4fb8efb6b0e92ac

  • memory/1472-206-0x0000000004BD0000-0x0000000004C05000-memory.dmp

    Filesize

    212KB

  • memory/1472-210-0x0000000004BD0000-0x0000000004C05000-memory.dmp

    Filesize

    212KB

  • memory/1472-986-0x0000000004B30000-0x0000000004B80000-memory.dmp

    Filesize

    320KB

  • memory/1472-985-0x000000000B210000-0x000000000B73C000-memory.dmp

    Filesize

    5.2MB

  • memory/1472-984-0x000000000B040000-0x000000000B202000-memory.dmp

    Filesize

    1.8MB

  • memory/1472-983-0x000000000AF70000-0x000000000AF8E000-memory.dmp

    Filesize

    120KB

  • memory/1472-982-0x000000000AED0000-0x000000000AF46000-memory.dmp

    Filesize

    472KB

  • memory/1472-981-0x000000000AD30000-0x000000000ADC2000-memory.dmp

    Filesize

    584KB

  • memory/1472-980-0x000000000A650000-0x000000000A6B6000-memory.dmp

    Filesize

    408KB

  • memory/1472-979-0x0000000004950000-0x0000000004960000-memory.dmp

    Filesize

    64KB

  • memory/1472-978-0x000000000A4C0000-0x000000000A50B000-memory.dmp

    Filesize

    300KB

  • memory/1472-977-0x000000000A340000-0x000000000A37E000-memory.dmp

    Filesize

    248KB

  • memory/1472-976-0x000000000A220000-0x000000000A32A000-memory.dmp

    Filesize

    1.0MB

  • memory/1472-975-0x000000000A1F0000-0x000000000A202000-memory.dmp

    Filesize

    72KB

  • memory/1472-974-0x0000000009B80000-0x000000000A186000-memory.dmp

    Filesize

    6.0MB

  • memory/1472-234-0x0000000004950000-0x0000000004960000-memory.dmp

    Filesize

    64KB

  • memory/1472-214-0x0000000004BD0000-0x0000000004C05000-memory.dmp

    Filesize

    212KB

  • memory/1472-212-0x0000000004BD0000-0x0000000004C05000-memory.dmp

    Filesize

    212KB

  • memory/1472-180-0x0000000004BD0000-0x0000000004C0A000-memory.dmp

    Filesize

    232KB

  • memory/1472-208-0x0000000004BD0000-0x0000000004C05000-memory.dmp

    Filesize

    212KB

  • memory/1472-204-0x0000000004BD0000-0x0000000004C05000-memory.dmp

    Filesize

    212KB

  • memory/1472-202-0x0000000004BD0000-0x0000000004C05000-memory.dmp

    Filesize

    212KB

  • memory/1472-200-0x0000000004BD0000-0x0000000004C05000-memory.dmp

    Filesize

    212KB

  • memory/1472-184-0x0000000004BD0000-0x0000000004C05000-memory.dmp

    Filesize

    212KB

  • memory/1472-196-0x0000000004BD0000-0x0000000004C05000-memory.dmp

    Filesize

    212KB

  • memory/1472-194-0x0000000004BD0000-0x0000000004C05000-memory.dmp

    Filesize

    212KB

  • memory/1472-176-0x0000000004900000-0x000000000493C000-memory.dmp

    Filesize

    240KB

  • memory/1472-177-0x0000000002CC0000-0x0000000002D06000-memory.dmp

    Filesize

    280KB

  • memory/1472-179-0x0000000004950000-0x0000000004960000-memory.dmp

    Filesize

    64KB

  • memory/1472-178-0x0000000004950000-0x0000000004960000-memory.dmp

    Filesize

    64KB

  • memory/1472-192-0x0000000004BD0000-0x0000000004C05000-memory.dmp

    Filesize

    212KB

  • memory/1472-182-0x0000000004BD0000-0x0000000004C05000-memory.dmp

    Filesize

    212KB

  • memory/1472-198-0x0000000004BD0000-0x0000000004C05000-memory.dmp

    Filesize

    212KB

  • memory/1472-181-0x0000000004BD0000-0x0000000004C05000-memory.dmp

    Filesize

    212KB

  • memory/1472-188-0x0000000004BD0000-0x0000000004C05000-memory.dmp

    Filesize

    212KB

  • memory/1472-190-0x0000000004BD0000-0x0000000004C05000-memory.dmp

    Filesize

    212KB

  • memory/1472-186-0x0000000004BD0000-0x0000000004C05000-memory.dmp

    Filesize

    212KB

  • memory/2348-142-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/2348-138-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/2348-134-0x0000000004A90000-0x0000000004AA8000-memory.dmp

    Filesize

    96KB

  • memory/2348-157-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/2348-168-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/2348-170-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

    Filesize

    64KB

  • memory/2348-169-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

    Filesize

    64KB

  • memory/2348-132-0x00000000048E0000-0x00000000048FA000-memory.dmp

    Filesize

    104KB

  • memory/2348-166-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/2348-165-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/2348-163-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/2348-155-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/2348-133-0x0000000007370000-0x000000000786E000-memory.dmp

    Filesize

    5.0MB

  • memory/2348-161-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/2348-135-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/2348-149-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

    Filesize

    64KB

  • memory/2348-153-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/2348-152-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

    Filesize

    64KB

  • memory/2348-150-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/2348-148-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

    Filesize

    64KB

  • memory/2348-146-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/2348-144-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/2348-159-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/2348-140-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/2348-171-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

    Filesize

    64KB

  • memory/2348-136-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/2348-131-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB