Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
54s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
25/04/2023, 21:56
Static task
static1
General
-
Target
c187eddaa4a16be54cf3550e4b3451573eb7f6433ea15c1748bef6e81c132456.exe
-
Size
695KB
-
MD5
a8709c5161ec9e1e1942deac36812edb
-
SHA1
cc95d4c90c83eb13ae4ecae8cdf4d064c1706e1b
-
SHA256
c187eddaa4a16be54cf3550e4b3451573eb7f6433ea15c1748bef6e81c132456
-
SHA512
1e970cfde4771230e333a2208f6e948258bc09115042b5066c02887a5fe1f875cd4cbabf2e72a0af9c95764de0ff5fb3f73402439e330c5c9f0764eb9f0a0a47
-
SSDEEP
12288:Ty90nsYfeQySdHbMcX8nMOqQTDj7XS83XxFdOqHSbZeSN0z1QggBsv:TyOlXymHbMcoGCDjGkFsbZoCggB0
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 24466237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 24466237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 24466237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 24466237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 24466237.exe -
Executes dropped EXE 4 IoCs
pid Process 3548 un553868.exe 2348 24466237.exe 1472 rk896088.exe 2892 si436750.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 24466237.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 24466237.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un553868.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un553868.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c187eddaa4a16be54cf3550e4b3451573eb7f6433ea15c1748bef6e81c132456.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c187eddaa4a16be54cf3550e4b3451573eb7f6433ea15c1748bef6e81c132456.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2348 24466237.exe 2348 24466237.exe 1472 rk896088.exe 1472 rk896088.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2348 24466237.exe Token: SeDebugPrivilege 1472 rk896088.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4148 wrote to memory of 3548 4148 c187eddaa4a16be54cf3550e4b3451573eb7f6433ea15c1748bef6e81c132456.exe 66 PID 4148 wrote to memory of 3548 4148 c187eddaa4a16be54cf3550e4b3451573eb7f6433ea15c1748bef6e81c132456.exe 66 PID 4148 wrote to memory of 3548 4148 c187eddaa4a16be54cf3550e4b3451573eb7f6433ea15c1748bef6e81c132456.exe 66 PID 3548 wrote to memory of 2348 3548 un553868.exe 67 PID 3548 wrote to memory of 2348 3548 un553868.exe 67 PID 3548 wrote to memory of 2348 3548 un553868.exe 67 PID 3548 wrote to memory of 1472 3548 un553868.exe 68 PID 3548 wrote to memory of 1472 3548 un553868.exe 68 PID 3548 wrote to memory of 1472 3548 un553868.exe 68 PID 4148 wrote to memory of 2892 4148 c187eddaa4a16be54cf3550e4b3451573eb7f6433ea15c1748bef6e81c132456.exe 70 PID 4148 wrote to memory of 2892 4148 c187eddaa4a16be54cf3550e4b3451573eb7f6433ea15c1748bef6e81c132456.exe 70 PID 4148 wrote to memory of 2892 4148 c187eddaa4a16be54cf3550e4b3451573eb7f6433ea15c1748bef6e81c132456.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\c187eddaa4a16be54cf3550e4b3451573eb7f6433ea15c1748bef6e81c132456.exe"C:\Users\Admin\AppData\Local\Temp\c187eddaa4a16be54cf3550e4b3451573eb7f6433ea15c1748bef6e81c132456.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un553868.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un553868.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\24466237.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\24466237.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk896088.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk896088.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si436750.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si436750.exe2⤵
- Executes dropped EXE
PID:2892
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
541KB
MD5a1143f6de5ee62d773e908f1e5721323
SHA141ce1778d6c7a7899394a7365bd8e4c741fe8dcc
SHA25671899819fbbdd32fc9c9ccad644cd9b035fd59caeba65372176dfd1663715fb4
SHA512f168bbab9322a8ea3120d63cdf8e17c65102a9a8a1ee1c84705303d94960d33b480a722a4c203313149dbb830b1fe72bb65e6ffcc3b7faba2cecfc0073ff90d8
-
Filesize
541KB
MD5a1143f6de5ee62d773e908f1e5721323
SHA141ce1778d6c7a7899394a7365bd8e4c741fe8dcc
SHA25671899819fbbdd32fc9c9ccad644cd9b035fd59caeba65372176dfd1663715fb4
SHA512f168bbab9322a8ea3120d63cdf8e17c65102a9a8a1ee1c84705303d94960d33b480a722a4c203313149dbb830b1fe72bb65e6ffcc3b7faba2cecfc0073ff90d8
-
Filesize
257KB
MD5dcf8f2710e47083fce7e08c434d9fec3
SHA1673890ec3e5d23b7b8dddcf5b2ea6ab32eb86bd3
SHA256e14a918545771a45e664d2ff7e235a72eacb2602491b54078f07fd6a492fba5e
SHA512056e3c6ddc8cfba1b9e7ac6063011e13feab3f48be738f99477a2cfb7e79669d880780c290ec5c1f4980e9ca2b34758632c95b1f7c1e31fa16691aab5778994e
-
Filesize
257KB
MD5dcf8f2710e47083fce7e08c434d9fec3
SHA1673890ec3e5d23b7b8dddcf5b2ea6ab32eb86bd3
SHA256e14a918545771a45e664d2ff7e235a72eacb2602491b54078f07fd6a492fba5e
SHA512056e3c6ddc8cfba1b9e7ac6063011e13feab3f48be738f99477a2cfb7e79669d880780c290ec5c1f4980e9ca2b34758632c95b1f7c1e31fa16691aab5778994e
-
Filesize
340KB
MD57504600869427a64c14a149a71d16db0
SHA19afed684011a2381cf1e06fbc79708eac1645be8
SHA25653355d2fd6ecb9d5317df484289a5b3faa497ef14ab14e492c4da9d045a865ee
SHA51226d0592201139c033cc37fbd3d0523d2adbfe39aca27933a1c9372c411700f997282b423595e85a32aa56a2076f8a046d9d47ebce7f07669e4fb8efb6b0e92ac
-
Filesize
340KB
MD57504600869427a64c14a149a71d16db0
SHA19afed684011a2381cf1e06fbc79708eac1645be8
SHA25653355d2fd6ecb9d5317df484289a5b3faa497ef14ab14e492c4da9d045a865ee
SHA51226d0592201139c033cc37fbd3d0523d2adbfe39aca27933a1c9372c411700f997282b423595e85a32aa56a2076f8a046d9d47ebce7f07669e4fb8efb6b0e92ac