Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2023, 05:42
Static task
static1
General
-
Target
49378b57053062cc2feeaad1134598e207cf44ff40ba93ee97dc5d176dd419ac.exe
-
Size
702KB
-
MD5
83705e7d545d2d593108cc12fb8b01c3
-
SHA1
7d3f132077ac38a0b362bb5ecf93317a7082ce2e
-
SHA256
49378b57053062cc2feeaad1134598e207cf44ff40ba93ee97dc5d176dd419ac
-
SHA512
32114bb237e476b732657901114302256e76c770b9c83f4889379e8a5f802a0b39e8c4d48a8aeaa085b55566df262f1b0ef2261bba5ae49d73dfd2804f394b6d
-
SSDEEP
12288:qy90aleOTFHn9qAdDF8eZYyKkBvBCvr+eyEG2Eo9wZGQVbXAUcFF9nlNzaGw:qynrTFwAd4GBCT+6Gaww4EnFFdldbw
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 97752658.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 97752658.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 97752658.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 97752658.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 97752658.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 97752658.exe -
Executes dropped EXE 4 IoCs
pid Process 4808 un402039.exe 4248 97752658.exe 1104 rk424253.exe 4248 si221186.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 97752658.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 97752658.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 49378b57053062cc2feeaad1134598e207cf44ff40ba93ee97dc5d176dd419ac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 49378b57053062cc2feeaad1134598e207cf44ff40ba93ee97dc5d176dd419ac.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un402039.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un402039.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2768 4248 WerFault.exe 84 4580 1104 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4248 97752658.exe 4248 97752658.exe 1104 rk424253.exe 1104 rk424253.exe 4248 si221186.exe 4248 si221186.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4248 97752658.exe Token: SeDebugPrivilege 1104 rk424253.exe Token: SeDebugPrivilege 4248 si221186.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4496 wrote to memory of 4808 4496 49378b57053062cc2feeaad1134598e207cf44ff40ba93ee97dc5d176dd419ac.exe 83 PID 4496 wrote to memory of 4808 4496 49378b57053062cc2feeaad1134598e207cf44ff40ba93ee97dc5d176dd419ac.exe 83 PID 4496 wrote to memory of 4808 4496 49378b57053062cc2feeaad1134598e207cf44ff40ba93ee97dc5d176dd419ac.exe 83 PID 4808 wrote to memory of 4248 4808 un402039.exe 84 PID 4808 wrote to memory of 4248 4808 un402039.exe 84 PID 4808 wrote to memory of 4248 4808 un402039.exe 84 PID 4808 wrote to memory of 1104 4808 un402039.exe 90 PID 4808 wrote to memory of 1104 4808 un402039.exe 90 PID 4808 wrote to memory of 1104 4808 un402039.exe 90 PID 4496 wrote to memory of 4248 4496 49378b57053062cc2feeaad1134598e207cf44ff40ba93ee97dc5d176dd419ac.exe 93 PID 4496 wrote to memory of 4248 4496 49378b57053062cc2feeaad1134598e207cf44ff40ba93ee97dc5d176dd419ac.exe 93 PID 4496 wrote to memory of 4248 4496 49378b57053062cc2feeaad1134598e207cf44ff40ba93ee97dc5d176dd419ac.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\49378b57053062cc2feeaad1134598e207cf44ff40ba93ee97dc5d176dd419ac.exe"C:\Users\Admin\AppData\Local\Temp\49378b57053062cc2feeaad1134598e207cf44ff40ba93ee97dc5d176dd419ac.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un402039.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un402039.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\97752658.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\97752658.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 10924⤵
- Program crash
PID:2768
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk424253.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk424253.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1104 -s 13004⤵
- Program crash
PID:4580
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si221186.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si221186.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4248 -ip 42481⤵PID:5016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1104 -ip 11041⤵PID:4488
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5b9f17cc95395f13838ba119abc3f742f
SHA1ecdbc7ef78234c1c7009fdbc6f744c511067767d
SHA2562e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15
SHA512bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca
-
Filesize
136KB
MD5b9f17cc95395f13838ba119abc3f742f
SHA1ecdbc7ef78234c1c7009fdbc6f744c511067767d
SHA2562e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15
SHA512bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca
-
Filesize
547KB
MD50829abc81b3138bcbe9e5c286fca911f
SHA1d417657a727e8033d1091903032c2f322fc4218c
SHA256b294b2827b541e7eb9f190f4e27304cb525089c9d15471269dcebfe82a43c8c6
SHA5129e296d504406c4d48120d5adeb17761b0fe41126f68e0d92e6b0052f1897c04bc9b7ec0be069939a006b89d05cd224126ea9ade63769b54ff13bcc2b55a4edef
-
Filesize
547KB
MD50829abc81b3138bcbe9e5c286fca911f
SHA1d417657a727e8033d1091903032c2f322fc4218c
SHA256b294b2827b541e7eb9f190f4e27304cb525089c9d15471269dcebfe82a43c8c6
SHA5129e296d504406c4d48120d5adeb17761b0fe41126f68e0d92e6b0052f1897c04bc9b7ec0be069939a006b89d05cd224126ea9ade63769b54ff13bcc2b55a4edef
-
Filesize
269KB
MD57d66822847447110fcbe8d2ad463b033
SHA1a50e2aea238f91d83ed43578794b73b83ad9e423
SHA2560efd23daaac57291cb816feaf7f9050597648e2e17f91f57788ab98ea5a65692
SHA51296110f5bfe550abaf0c3b469726f7fccf9fefe874bb506d9da5cda7213d3586c554dc59cd3a8262afe3a578de526054e304777dc67b2a80b7159798c8574ad54
-
Filesize
269KB
MD57d66822847447110fcbe8d2ad463b033
SHA1a50e2aea238f91d83ed43578794b73b83ad9e423
SHA2560efd23daaac57291cb816feaf7f9050597648e2e17f91f57788ab98ea5a65692
SHA51296110f5bfe550abaf0c3b469726f7fccf9fefe874bb506d9da5cda7213d3586c554dc59cd3a8262afe3a578de526054e304777dc67b2a80b7159798c8574ad54
-
Filesize
353KB
MD5a192a9faf89a114a94b51a8e3d080bbe
SHA165544096de41ee903c7f49d38eaeabfb2d66a799
SHA25691d2066922b4ad5585fb4ab83aa4d5f617b82ddd6cdf5609fd0c0e9321590e49
SHA512959a6dd12a439317d6b65eeb84aa82a4cbe3c1237ada7a3ccc49eb9e4f7d43cbec51280961b36bdc85186972d6b79d17807a40fc686d710b30cff43f91088f3e
-
Filesize
353KB
MD5a192a9faf89a114a94b51a8e3d080bbe
SHA165544096de41ee903c7f49d38eaeabfb2d66a799
SHA25691d2066922b4ad5585fb4ab83aa4d5f617b82ddd6cdf5609fd0c0e9321590e49
SHA512959a6dd12a439317d6b65eeb84aa82a4cbe3c1237ada7a3ccc49eb9e4f7d43cbec51280961b36bdc85186972d6b79d17807a40fc686d710b30cff43f91088f3e