Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    84s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/04/2023, 01:37

General

  • Target

    c55c309bcd68445c253b179b160216244bed16d5ad6ef9b9d6f39e559807c547.exe

  • Size

    566KB

  • MD5

    9146b8cdfeb1a0700b7a19ad2f7b4da0

  • SHA1

    c109f4459d35293a1f4f483cf2e51a6f006c7b71

  • SHA256

    c55c309bcd68445c253b179b160216244bed16d5ad6ef9b9d6f39e559807c547

  • SHA512

    1b45be58080e4854f15e85b03ab8170ea60dea0e3283fa3f994c5454cc401680d750e40700949a79035937c93c98352ffba368df0eaf37cb0daf654915aa5b17

  • SSDEEP

    12288:0y90Y/KGIgM+Nay2ggoR3gGh2qPs1J1CBHsFIp1XRc:0yKGIgoyDR3wqU1J1CBHsyXRc

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c55c309bcd68445c253b179b160216244bed16d5ad6ef9b9d6f39e559807c547.exe
    "C:\Users\Admin\AppData\Local\Temp\c55c309bcd68445c253b179b160216244bed16d5ad6ef9b9d6f39e559807c547.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioN9184.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioN9184.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4344
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it367461.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it367461.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2096
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp801927.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp801927.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:780
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 780 -s 1320
          4⤵
          • Program crash
          PID:536
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr982338.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr982338.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4808
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 780 -ip 780
    1⤵
      PID:3180

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr982338.exe

      Filesize

      136KB

      MD5

      8c80b06d843bd6a7599a5be2075d9a55

      SHA1

      caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

      SHA256

      e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

      SHA512

      cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr982338.exe

      Filesize

      136KB

      MD5

      8c80b06d843bd6a7599a5be2075d9a55

      SHA1

      caf86cf2f908f6ac64b8d4788bc61aaaf672f9f2

      SHA256

      e794f573618cef6be742a0f574f179aa1087b51c4ec23bcf7faa16415028850e

      SHA512

      cd902bd2607ee797a60f615c550304e45ff59f2313cbb596b50fae913eae481987a8bde0a83587b153192eeb97514f281864c5fb3db4dc128453d507c5aeeded

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioN9184.exe

      Filesize

      412KB

      MD5

      b82708db4964bc18e5192c5a3bf8a3f4

      SHA1

      86b730da9403b0fae0a9e2a94cdd14d51dbdd4fa

      SHA256

      6da74f3c76362cb54ef2f3e04781539b2da663b809864ce99442211bc4969de9

      SHA512

      e7a7818ca4575b376bb2195d8fe2127b0a60e940bf96aced3f8e5e36e4ae8ab47462facc7145a834686ac7965904f1887cf93fa2cafb1cdc254953cce67933ee

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioN9184.exe

      Filesize

      412KB

      MD5

      b82708db4964bc18e5192c5a3bf8a3f4

      SHA1

      86b730da9403b0fae0a9e2a94cdd14d51dbdd4fa

      SHA256

      6da74f3c76362cb54ef2f3e04781539b2da663b809864ce99442211bc4969de9

      SHA512

      e7a7818ca4575b376bb2195d8fe2127b0a60e940bf96aced3f8e5e36e4ae8ab47462facc7145a834686ac7965904f1887cf93fa2cafb1cdc254953cce67933ee

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it367461.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it367461.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp801927.exe

      Filesize

      368KB

      MD5

      bb3b96ea0401e410651a30800f95f6e2

      SHA1

      c9f840b96ecde12f861241b7acda9be33a2f7e7e

      SHA256

      f4c9780c234621f8b1eeedf93a75848a3adb5b54ff28dda31041f09dbb6ddd96

      SHA512

      2db61a411c0cba8f1199f4e6b192b4a1105dbe052e9eee9d84ea55a6cd63631fe00deeaae0217c65be1c3dbafa61453d20bc788702c8e19d4be3fd351007d5d6

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp801927.exe

      Filesize

      368KB

      MD5

      bb3b96ea0401e410651a30800f95f6e2

      SHA1

      c9f840b96ecde12f861241b7acda9be33a2f7e7e

      SHA256

      f4c9780c234621f8b1eeedf93a75848a3adb5b54ff28dda31041f09dbb6ddd96

      SHA512

      2db61a411c0cba8f1199f4e6b192b4a1105dbe052e9eee9d84ea55a6cd63631fe00deeaae0217c65be1c3dbafa61453d20bc788702c8e19d4be3fd351007d5d6

    • memory/780-153-0x0000000002CA0000-0x0000000002CE6000-memory.dmp

      Filesize

      280KB

    • memory/780-154-0x0000000007260000-0x0000000007804000-memory.dmp

      Filesize

      5.6MB

    • memory/780-155-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-156-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-158-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-160-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-162-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-164-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-166-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-168-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-170-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-172-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-174-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-178-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-176-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-180-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-182-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-184-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-186-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-188-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-190-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-193-0x0000000007250000-0x0000000007260000-memory.dmp

      Filesize

      64KB

    • memory/780-196-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-195-0x0000000007250000-0x0000000007260000-memory.dmp

      Filesize

      64KB

    • memory/780-192-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-197-0x0000000007250000-0x0000000007260000-memory.dmp

      Filesize

      64KB

    • memory/780-199-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-201-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-203-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-205-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-207-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-209-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-211-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-213-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-215-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-217-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-219-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-221-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/780-950-0x0000000009C90000-0x000000000A2A8000-memory.dmp

      Filesize

      6.1MB

    • memory/780-951-0x000000000A320000-0x000000000A332000-memory.dmp

      Filesize

      72KB

    • memory/780-952-0x000000000A340000-0x000000000A44A000-memory.dmp

      Filesize

      1.0MB

    • memory/780-954-0x000000000A4A0000-0x000000000A4DC000-memory.dmp

      Filesize

      240KB

    • memory/780-953-0x0000000007250000-0x0000000007260000-memory.dmp

      Filesize

      64KB

    • memory/780-955-0x000000000A760000-0x000000000A7C6000-memory.dmp

      Filesize

      408KB

    • memory/780-956-0x000000000AE20000-0x000000000AEB2000-memory.dmp

      Filesize

      584KB

    • memory/780-957-0x000000000AED0000-0x000000000AF20000-memory.dmp

      Filesize

      320KB

    • memory/780-958-0x000000000AF40000-0x000000000AFB6000-memory.dmp

      Filesize

      472KB

    • memory/780-960-0x000000000B120000-0x000000000B2E2000-memory.dmp

      Filesize

      1.8MB

    • memory/780-961-0x000000000B300000-0x000000000B82C000-memory.dmp

      Filesize

      5.2MB

    • memory/780-962-0x000000000BB30000-0x000000000BB4E000-memory.dmp

      Filesize

      120KB

    • memory/780-964-0x0000000007250000-0x0000000007260000-memory.dmp

      Filesize

      64KB

    • memory/780-966-0x0000000007250000-0x0000000007260000-memory.dmp

      Filesize

      64KB

    • memory/780-965-0x0000000007250000-0x0000000007260000-memory.dmp

      Filesize

      64KB

    • memory/2096-147-0x0000000000390000-0x000000000039A000-memory.dmp

      Filesize

      40KB

    • memory/4808-971-0x0000000000B80000-0x0000000000BA8000-memory.dmp

      Filesize

      160KB

    • memory/4808-972-0x00000000078A0000-0x00000000078B0000-memory.dmp

      Filesize

      64KB