Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    55s
  • max time network
    69s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25/04/2023, 04:07

General

  • Target

    6d88abf20a98acdfcce7f6acce07abe894d33fcf0192d701a6d3b8df9c70341c.exe

  • Size

    746KB

  • MD5

    51dc7c6d56f9a2a738bdc55dcfe0e916

  • SHA1

    b787c970f9542d8158b7170b679dd1bb0e5334ec

  • SHA256

    6d88abf20a98acdfcce7f6acce07abe894d33fcf0192d701a6d3b8df9c70341c

  • SHA512

    a861929286112ebd6b2a0d56a4dd271402e41faf01f3b8cb906813150f7e7064ae10b6f3072688fcb023844ce480e7cd7a8d55d7ce279b69ff67d6841b9ae923

  • SSDEEP

    12288:Cy90qOiQKB2HYFpMcxkPxg34YyP7scXrMIZt3JDi960BtPXSQBt0/aO1xfr:CyJ5Qxg+rPx0457scXrv9RnMPXSQBtCH

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d88abf20a98acdfcce7f6acce07abe894d33fcf0192d701a6d3b8df9c70341c.exe
    "C:\Users\Admin\AppData\Local\Temp\6d88abf20a98acdfcce7f6acce07abe894d33fcf0192d701a6d3b8df9c70341c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un693468.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un693468.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1592
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\12757380.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\12757380.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk182561.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk182561.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4548
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si652248.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si652248.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1032

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si652248.exe

    Filesize

    136KB

    MD5

    b9f17cc95395f13838ba119abc3f742f

    SHA1

    ecdbc7ef78234c1c7009fdbc6f744c511067767d

    SHA256

    2e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15

    SHA512

    bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si652248.exe

    Filesize

    136KB

    MD5

    b9f17cc95395f13838ba119abc3f742f

    SHA1

    ecdbc7ef78234c1c7009fdbc6f744c511067767d

    SHA256

    2e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15

    SHA512

    bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un693468.exe

    Filesize

    591KB

    MD5

    b6fff862ec008f02ea07449a3bcfd865

    SHA1

    22275b7d7fecbcd2b93722e44a30310df7f0dec4

    SHA256

    2364c0f7b9ccdf2854e40385f5d5df283a28d5cf0fb9ae363dcd7bb2b156796e

    SHA512

    f029b8441cafdc2635a083a73a66f72bbe84082d4a494ca47afc65b471cda6b1765d3bca7fa9b81c4e9def8e451a17f96b9d1348df4d5b5558946f6a69ad0cca

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un693468.exe

    Filesize

    591KB

    MD5

    b6fff862ec008f02ea07449a3bcfd865

    SHA1

    22275b7d7fecbcd2b93722e44a30310df7f0dec4

    SHA256

    2364c0f7b9ccdf2854e40385f5d5df283a28d5cf0fb9ae363dcd7bb2b156796e

    SHA512

    f029b8441cafdc2635a083a73a66f72bbe84082d4a494ca47afc65b471cda6b1765d3bca7fa9b81c4e9def8e451a17f96b9d1348df4d5b5558946f6a69ad0cca

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\12757380.exe

    Filesize

    376KB

    MD5

    72329d13c88dd48a0238119ab8f22f9e

    SHA1

    5c198c067c202c8a75beffb5373b018fb0556ca0

    SHA256

    8f96dbabe246fcbada67a586ef50b0223b9edcabadb14676c9440cd1bb07bec8

    SHA512

    c34ace598be91db70dc63aec95f6819c8e3e2c8b496268bd291e8b63f9e044de227ff4d88fecab3da2a6925451036a8cd8f9a06864673759f6a1ed4799e89e87

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\12757380.exe

    Filesize

    376KB

    MD5

    72329d13c88dd48a0238119ab8f22f9e

    SHA1

    5c198c067c202c8a75beffb5373b018fb0556ca0

    SHA256

    8f96dbabe246fcbada67a586ef50b0223b9edcabadb14676c9440cd1bb07bec8

    SHA512

    c34ace598be91db70dc63aec95f6819c8e3e2c8b496268bd291e8b63f9e044de227ff4d88fecab3da2a6925451036a8cd8f9a06864673759f6a1ed4799e89e87

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk182561.exe

    Filesize

    459KB

    MD5

    85829ffa674b4fc4a282da63d9289d8e

    SHA1

    72ef6704a87a409866b2a2627fa062216bbe6cfc

    SHA256

    6c3ba4075c376538edaec2f6b7fddc0480d8bb9b3aa45c95fab010436d05d146

    SHA512

    d77898855f2f23abd6a6afb89eb47f39cfd7b629ab30bd305ba35f1c24c1d0f09b7c8fd46ff8b34b9fb597ae31af82b0a096f25124427af46ccb67a210991e24

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk182561.exe

    Filesize

    459KB

    MD5

    85829ffa674b4fc4a282da63d9289d8e

    SHA1

    72ef6704a87a409866b2a2627fa062216bbe6cfc

    SHA256

    6c3ba4075c376538edaec2f6b7fddc0480d8bb9b3aa45c95fab010436d05d146

    SHA512

    d77898855f2f23abd6a6afb89eb47f39cfd7b629ab30bd305ba35f1c24c1d0f09b7c8fd46ff8b34b9fb597ae31af82b0a096f25124427af46ccb67a210991e24

  • memory/1032-998-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/1032-997-0x0000000000E30000-0x0000000000E58000-memory.dmp

    Filesize

    160KB

  • memory/1032-999-0x0000000007D50000-0x0000000007D9B000-memory.dmp

    Filesize

    300KB

  • memory/1968-146-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/1968-158-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/1968-140-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/1968-141-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/1968-142-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/1968-143-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/1968-144-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/1968-138-0x00000000024F0000-0x0000000002508000-memory.dmp

    Filesize

    96KB

  • memory/1968-148-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/1968-150-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/1968-152-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/1968-154-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/1968-156-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/1968-139-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/1968-160-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/1968-162-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/1968-164-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/1968-166-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/1968-168-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/1968-170-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/1968-171-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/1968-172-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/1968-173-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/1968-174-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/1968-176-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/1968-137-0x0000000004EE0000-0x00000000053DE000-memory.dmp

    Filesize

    5.0MB

  • memory/1968-136-0x00000000022D0000-0x00000000022EA000-memory.dmp

    Filesize

    104KB

  • memory/4548-181-0x00000000028A0000-0x00000000028DC000-memory.dmp

    Filesize

    240KB

  • memory/4548-183-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/4548-186-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/4548-188-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/4548-190-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/4548-192-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/4548-194-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/4548-196-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/4548-198-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/4548-200-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/4548-202-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/4548-204-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/4548-206-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/4548-208-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/4548-210-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/4548-212-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/4548-214-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/4548-217-0x00000000021B0000-0x00000000021F6000-memory.dmp

    Filesize

    280KB

  • memory/4548-216-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/4548-220-0x0000000004E80000-0x0000000004E90000-memory.dmp

    Filesize

    64KB

  • memory/4548-219-0x0000000004E80000-0x0000000004E90000-memory.dmp

    Filesize

    64KB

  • memory/4548-222-0x0000000004E80000-0x0000000004E90000-memory.dmp

    Filesize

    64KB

  • memory/4548-979-0x0000000007810000-0x0000000007E16000-memory.dmp

    Filesize

    6.0MB

  • memory/4548-980-0x0000000007E60000-0x0000000007E72000-memory.dmp

    Filesize

    72KB

  • memory/4548-981-0x0000000007E90000-0x0000000007F9A000-memory.dmp

    Filesize

    1.0MB

  • memory/4548-982-0x0000000007FB0000-0x0000000007FEE000-memory.dmp

    Filesize

    248KB

  • memory/4548-983-0x0000000008130000-0x000000000817B000-memory.dmp

    Filesize

    300KB

  • memory/4548-984-0x0000000004E80000-0x0000000004E90000-memory.dmp

    Filesize

    64KB

  • memory/4548-985-0x00000000082C0000-0x0000000008326000-memory.dmp

    Filesize

    408KB

  • memory/4548-986-0x00000000089A0000-0x0000000008A32000-memory.dmp

    Filesize

    584KB

  • memory/4548-987-0x0000000008A40000-0x0000000008AB6000-memory.dmp

    Filesize

    472KB

  • memory/4548-988-0x0000000008B00000-0x0000000008CC2000-memory.dmp

    Filesize

    1.8MB

  • memory/4548-184-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/4548-182-0x0000000004D90000-0x0000000004DCA000-memory.dmp

    Filesize

    232KB

  • memory/4548-989-0x0000000008CE0000-0x000000000920C000-memory.dmp

    Filesize

    5.2MB

  • memory/4548-990-0x0000000009340000-0x000000000935E000-memory.dmp

    Filesize

    120KB

  • memory/4548-991-0x00000000024B0000-0x0000000002500000-memory.dmp

    Filesize

    320KB