Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/04/2023, 05:42

General

  • Target

    49378b57053062cc2feeaad1134598e207cf44ff40ba93ee97dc5d176dd419ac.exe

  • Size

    702KB

  • MD5

    83705e7d545d2d593108cc12fb8b01c3

  • SHA1

    7d3f132077ac38a0b362bb5ecf93317a7082ce2e

  • SHA256

    49378b57053062cc2feeaad1134598e207cf44ff40ba93ee97dc5d176dd419ac

  • SHA512

    32114bb237e476b732657901114302256e76c770b9c83f4889379e8a5f802a0b39e8c4d48a8aeaa085b55566df262f1b0ef2261bba5ae49d73dfd2804f394b6d

  • SSDEEP

    12288:qy90aleOTFHn9qAdDF8eZYyKkBvBCvr+eyEG2Eo9wZGQVbXAUcFF9nlNzaGw:qynrTFwAd4GBCT+6Gaww4EnFFdldbw

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49378b57053062cc2feeaad1134598e207cf44ff40ba93ee97dc5d176dd419ac.exe
    "C:\Users\Admin\AppData\Local\Temp\49378b57053062cc2feeaad1134598e207cf44ff40ba93ee97dc5d176dd419ac.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4496
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un402039.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un402039.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4808
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\97752658.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\97752658.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4248
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 1092
          4⤵
          • Program crash
          PID:2768
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk424253.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk424253.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1104
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1104 -s 1300
          4⤵
          • Program crash
          PID:4580
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si221186.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si221186.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4248
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4248 -ip 4248
    1⤵
      PID:5016
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1104 -ip 1104
      1⤵
        PID:4488

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si221186.exe

        Filesize

        136KB

        MD5

        b9f17cc95395f13838ba119abc3f742f

        SHA1

        ecdbc7ef78234c1c7009fdbc6f744c511067767d

        SHA256

        2e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15

        SHA512

        bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si221186.exe

        Filesize

        136KB

        MD5

        b9f17cc95395f13838ba119abc3f742f

        SHA1

        ecdbc7ef78234c1c7009fdbc6f744c511067767d

        SHA256

        2e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15

        SHA512

        bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un402039.exe

        Filesize

        547KB

        MD5

        0829abc81b3138bcbe9e5c286fca911f

        SHA1

        d417657a727e8033d1091903032c2f322fc4218c

        SHA256

        b294b2827b541e7eb9f190f4e27304cb525089c9d15471269dcebfe82a43c8c6

        SHA512

        9e296d504406c4d48120d5adeb17761b0fe41126f68e0d92e6b0052f1897c04bc9b7ec0be069939a006b89d05cd224126ea9ade63769b54ff13bcc2b55a4edef

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un402039.exe

        Filesize

        547KB

        MD5

        0829abc81b3138bcbe9e5c286fca911f

        SHA1

        d417657a727e8033d1091903032c2f322fc4218c

        SHA256

        b294b2827b541e7eb9f190f4e27304cb525089c9d15471269dcebfe82a43c8c6

        SHA512

        9e296d504406c4d48120d5adeb17761b0fe41126f68e0d92e6b0052f1897c04bc9b7ec0be069939a006b89d05cd224126ea9ade63769b54ff13bcc2b55a4edef

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\97752658.exe

        Filesize

        269KB

        MD5

        7d66822847447110fcbe8d2ad463b033

        SHA1

        a50e2aea238f91d83ed43578794b73b83ad9e423

        SHA256

        0efd23daaac57291cb816feaf7f9050597648e2e17f91f57788ab98ea5a65692

        SHA512

        96110f5bfe550abaf0c3b469726f7fccf9fefe874bb506d9da5cda7213d3586c554dc59cd3a8262afe3a578de526054e304777dc67b2a80b7159798c8574ad54

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\97752658.exe

        Filesize

        269KB

        MD5

        7d66822847447110fcbe8d2ad463b033

        SHA1

        a50e2aea238f91d83ed43578794b73b83ad9e423

        SHA256

        0efd23daaac57291cb816feaf7f9050597648e2e17f91f57788ab98ea5a65692

        SHA512

        96110f5bfe550abaf0c3b469726f7fccf9fefe874bb506d9da5cda7213d3586c554dc59cd3a8262afe3a578de526054e304777dc67b2a80b7159798c8574ad54

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk424253.exe

        Filesize

        353KB

        MD5

        a192a9faf89a114a94b51a8e3d080bbe

        SHA1

        65544096de41ee903c7f49d38eaeabfb2d66a799

        SHA256

        91d2066922b4ad5585fb4ab83aa4d5f617b82ddd6cdf5609fd0c0e9321590e49

        SHA512

        959a6dd12a439317d6b65eeb84aa82a4cbe3c1237ada7a3ccc49eb9e4f7d43cbec51280961b36bdc85186972d6b79d17807a40fc686d710b30cff43f91088f3e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk424253.exe

        Filesize

        353KB

        MD5

        a192a9faf89a114a94b51a8e3d080bbe

        SHA1

        65544096de41ee903c7f49d38eaeabfb2d66a799

        SHA256

        91d2066922b4ad5585fb4ab83aa4d5f617b82ddd6cdf5609fd0c0e9321590e49

        SHA512

        959a6dd12a439317d6b65eeb84aa82a4cbe3c1237ada7a3ccc49eb9e4f7d43cbec51280961b36bdc85186972d6b79d17807a40fc686d710b30cff43f91088f3e

      • memory/1104-414-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/1104-985-0x000000000A310000-0x000000000A322000-memory.dmp

        Filesize

        72KB

      • memory/1104-996-0x0000000004AF0000-0x0000000004B40000-memory.dmp

        Filesize

        320KB

      • memory/1104-994-0x000000000B7E0000-0x000000000B7FE000-memory.dmp

        Filesize

        120KB

      • memory/1104-993-0x000000000B190000-0x000000000B6BC000-memory.dmp

        Filesize

        5.2MB

      • memory/1104-992-0x000000000AFC0000-0x000000000B182000-memory.dmp

        Filesize

        1.8MB

      • memory/1104-991-0x000000000AEE0000-0x000000000AF56000-memory.dmp

        Filesize

        472KB

      • memory/1104-990-0x000000000AE20000-0x000000000AEB2000-memory.dmp

        Filesize

        584KB

      • memory/1104-989-0x000000000A750000-0x000000000A7B6000-memory.dmp

        Filesize

        408KB

      • memory/1104-988-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/1104-987-0x000000000A450000-0x000000000A48C000-memory.dmp

        Filesize

        240KB

      • memory/1104-986-0x000000000A330000-0x000000000A43A000-memory.dmp

        Filesize

        1.0MB

      • memory/1104-984-0x0000000009C60000-0x000000000A278000-memory.dmp

        Filesize

        6.1MB

      • memory/1104-412-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/1104-410-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/1104-408-0x00000000045B0000-0x00000000045F6000-memory.dmp

        Filesize

        280KB

      • memory/1104-221-0x0000000004C10000-0x0000000004C45000-memory.dmp

        Filesize

        212KB

      • memory/1104-219-0x0000000004C10000-0x0000000004C45000-memory.dmp

        Filesize

        212KB

      • memory/1104-217-0x0000000004C10000-0x0000000004C45000-memory.dmp

        Filesize

        212KB

      • memory/1104-215-0x0000000004C10000-0x0000000004C45000-memory.dmp

        Filesize

        212KB

      • memory/1104-189-0x0000000004C10000-0x0000000004C45000-memory.dmp

        Filesize

        212KB

      • memory/1104-188-0x0000000004C10000-0x0000000004C45000-memory.dmp

        Filesize

        212KB

      • memory/1104-191-0x0000000004C10000-0x0000000004C45000-memory.dmp

        Filesize

        212KB

      • memory/1104-193-0x0000000004C10000-0x0000000004C45000-memory.dmp

        Filesize

        212KB

      • memory/1104-195-0x0000000004C10000-0x0000000004C45000-memory.dmp

        Filesize

        212KB

      • memory/1104-197-0x0000000004C10000-0x0000000004C45000-memory.dmp

        Filesize

        212KB

      • memory/1104-199-0x0000000004C10000-0x0000000004C45000-memory.dmp

        Filesize

        212KB

      • memory/1104-201-0x0000000004C10000-0x0000000004C45000-memory.dmp

        Filesize

        212KB

      • memory/1104-203-0x0000000004C10000-0x0000000004C45000-memory.dmp

        Filesize

        212KB

      • memory/1104-205-0x0000000004C10000-0x0000000004C45000-memory.dmp

        Filesize

        212KB

      • memory/1104-207-0x0000000004C10000-0x0000000004C45000-memory.dmp

        Filesize

        212KB

      • memory/1104-209-0x0000000004C10000-0x0000000004C45000-memory.dmp

        Filesize

        212KB

      • memory/1104-211-0x0000000004C10000-0x0000000004C45000-memory.dmp

        Filesize

        212KB

      • memory/1104-213-0x0000000004C10000-0x0000000004C45000-memory.dmp

        Filesize

        212KB

      • memory/4248-168-0x0000000004A60000-0x0000000004A72000-memory.dmp

        Filesize

        72KB

      • memory/4248-150-0x0000000007170000-0x0000000007180000-memory.dmp

        Filesize

        64KB

      • memory/4248-183-0x0000000000400000-0x0000000002B9E000-memory.dmp

        Filesize

        39.6MB

      • memory/4248-181-0x0000000000400000-0x0000000002B9E000-memory.dmp

        Filesize

        39.6MB

      • memory/4248-180-0x0000000004A60000-0x0000000004A72000-memory.dmp

        Filesize

        72KB

      • memory/4248-178-0x0000000004A60000-0x0000000004A72000-memory.dmp

        Filesize

        72KB

      • memory/4248-170-0x0000000004A60000-0x0000000004A72000-memory.dmp

        Filesize

        72KB

      • memory/4248-176-0x0000000004A60000-0x0000000004A72000-memory.dmp

        Filesize

        72KB

      • memory/4248-174-0x0000000004A60000-0x0000000004A72000-memory.dmp

        Filesize

        72KB

      • memory/4248-153-0x0000000004A60000-0x0000000004A72000-memory.dmp

        Filesize

        72KB

      • memory/4248-152-0x0000000007180000-0x0000000007724000-memory.dmp

        Filesize

        5.6MB

      • memory/4248-172-0x0000000004A60000-0x0000000004A72000-memory.dmp

        Filesize

        72KB

      • memory/4248-160-0x0000000004A60000-0x0000000004A72000-memory.dmp

        Filesize

        72KB

      • memory/4248-166-0x0000000004A60000-0x0000000004A72000-memory.dmp

        Filesize

        72KB

      • memory/4248-164-0x0000000004A60000-0x0000000004A72000-memory.dmp

        Filesize

        72KB

      • memory/4248-162-0x0000000004A60000-0x0000000004A72000-memory.dmp

        Filesize

        72KB

      • memory/4248-151-0x0000000007170000-0x0000000007180000-memory.dmp

        Filesize

        64KB

      • memory/4248-158-0x0000000004A60000-0x0000000004A72000-memory.dmp

        Filesize

        72KB

      • memory/4248-156-0x0000000004A60000-0x0000000004A72000-memory.dmp

        Filesize

        72KB

      • memory/4248-154-0x0000000004A60000-0x0000000004A72000-memory.dmp

        Filesize

        72KB

      • memory/4248-149-0x0000000007170000-0x0000000007180000-memory.dmp

        Filesize

        64KB

      • memory/4248-148-0x0000000002C70000-0x0000000002C9D000-memory.dmp

        Filesize

        180KB

      • memory/4248-1002-0x00000000009A0000-0x00000000009C8000-memory.dmp

        Filesize

        160KB

      • memory/4248-1003-0x0000000007AA0000-0x0000000007AB0000-memory.dmp

        Filesize

        64KB