Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
98s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2023, 05:58
Static task
static1
General
-
Target
78ce8fb313e4d504c8987f19ff57b434f3673437c51aff121ca07286feb6552a.exe
-
Size
701KB
-
MD5
20893eab8201e5ee1a02927d50cd835e
-
SHA1
7887d946de1e76746fecc338e6cd5d265045597e
-
SHA256
78ce8fb313e4d504c8987f19ff57b434f3673437c51aff121ca07286feb6552a
-
SHA512
4d726e18cc94b156d7e36d0b6adbb1853a92f42f48e482c30e996b6ce44b7f1f4af183e778ac7e16b4bb0228c63495195aa498e5070ac8639b50acd6a542f929
-
SSDEEP
12288:9y90IL2bOi/cXXv/qjTYF541KZ0fCLk4c8Xf1M913kyEG28o9wa9wNVGl5PzanB8:9yabOlHHwTPKZHfcaGuwesiGRG
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 80104994.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 80104994.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 80104994.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 80104994.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 80104994.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 80104994.exe -
Executes dropped EXE 4 IoCs
pid Process 1160 un587100.exe 1232 80104994.exe 228 rk920919.exe 1420 si543672.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 80104994.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 80104994.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un587100.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 78ce8fb313e4d504c8987f19ff57b434f3673437c51aff121ca07286feb6552a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 78ce8fb313e4d504c8987f19ff57b434f3673437c51aff121ca07286feb6552a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un587100.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4272 1232 WerFault.exe 84 2652 228 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1232 80104994.exe 1232 80104994.exe 228 rk920919.exe 228 rk920919.exe 1420 si543672.exe 1420 si543672.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1232 80104994.exe Token: SeDebugPrivilege 228 rk920919.exe Token: SeDebugPrivilege 1420 si543672.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 984 wrote to memory of 1160 984 78ce8fb313e4d504c8987f19ff57b434f3673437c51aff121ca07286feb6552a.exe 83 PID 984 wrote to memory of 1160 984 78ce8fb313e4d504c8987f19ff57b434f3673437c51aff121ca07286feb6552a.exe 83 PID 984 wrote to memory of 1160 984 78ce8fb313e4d504c8987f19ff57b434f3673437c51aff121ca07286feb6552a.exe 83 PID 1160 wrote to memory of 1232 1160 un587100.exe 84 PID 1160 wrote to memory of 1232 1160 un587100.exe 84 PID 1160 wrote to memory of 1232 1160 un587100.exe 84 PID 1160 wrote to memory of 228 1160 un587100.exe 87 PID 1160 wrote to memory of 228 1160 un587100.exe 87 PID 1160 wrote to memory of 228 1160 un587100.exe 87 PID 984 wrote to memory of 1420 984 78ce8fb313e4d504c8987f19ff57b434f3673437c51aff121ca07286feb6552a.exe 90 PID 984 wrote to memory of 1420 984 78ce8fb313e4d504c8987f19ff57b434f3673437c51aff121ca07286feb6552a.exe 90 PID 984 wrote to memory of 1420 984 78ce8fb313e4d504c8987f19ff57b434f3673437c51aff121ca07286feb6552a.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\78ce8fb313e4d504c8987f19ff57b434f3673437c51aff121ca07286feb6552a.exe"C:\Users\Admin\AppData\Local\Temp\78ce8fb313e4d504c8987f19ff57b434f3673437c51aff121ca07286feb6552a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un587100.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un587100.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\80104994.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\80104994.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 10924⤵
- Program crash
PID:4272
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk920919.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk920919.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 15924⤵
- Program crash
PID:2652
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si543672.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si543672.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1232 -ip 12321⤵PID:1744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 228 -ip 2281⤵PID:1112
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5b9f17cc95395f13838ba119abc3f742f
SHA1ecdbc7ef78234c1c7009fdbc6f744c511067767d
SHA2562e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15
SHA512bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca
-
Filesize
136KB
MD5b9f17cc95395f13838ba119abc3f742f
SHA1ecdbc7ef78234c1c7009fdbc6f744c511067767d
SHA2562e10845ea49bdd31991f80c88db940340e9f65c22eb3d1dc719e452fbcc17a15
SHA512bf05c4b13405337bf71e69e8b751af742b24d47de2a46be74a5bb86d37e6eee099ef11d871e3514b1ee9c9458c1ac8127b6858eaae04dfced284d1ec87e34bca
-
Filesize
547KB
MD50a9f8d698184de3f290cd5367c33f7f8
SHA1f82440457d35dacd4877503775bd6a76064f06e5
SHA256d2ba2aaa5b4461f9f85ce8de10b0d4878ff79d65e2cba49461bb39e386537d26
SHA5127b34dec8f96f179436d86a5d92cc0add59e25c766a5b2f0f4356ec241eaa1f3fd19c7d104d36b695953fbceaa52ed975d322f343913dc133eb250b41cf5b103f
-
Filesize
547KB
MD50a9f8d698184de3f290cd5367c33f7f8
SHA1f82440457d35dacd4877503775bd6a76064f06e5
SHA256d2ba2aaa5b4461f9f85ce8de10b0d4878ff79d65e2cba49461bb39e386537d26
SHA5127b34dec8f96f179436d86a5d92cc0add59e25c766a5b2f0f4356ec241eaa1f3fd19c7d104d36b695953fbceaa52ed975d322f343913dc133eb250b41cf5b103f
-
Filesize
269KB
MD5da1263bdee4640065bd7fb242fd4ff7a
SHA1a10f40756cf85cf29578c8031bec465db0b9218a
SHA25679fe6d1553b2797361ee9386a17d6ae304585b75c8e8ec27bb0763ade69045ff
SHA512cd07a5f600e9f2066fbae16101f16989cb5660729c96a06cf8fe45a175810d8104773051102bace5e3d1ebb92e1c137c8446c3148ef5e0838e410e5e76c4294e
-
Filesize
269KB
MD5da1263bdee4640065bd7fb242fd4ff7a
SHA1a10f40756cf85cf29578c8031bec465db0b9218a
SHA25679fe6d1553b2797361ee9386a17d6ae304585b75c8e8ec27bb0763ade69045ff
SHA512cd07a5f600e9f2066fbae16101f16989cb5660729c96a06cf8fe45a175810d8104773051102bace5e3d1ebb92e1c137c8446c3148ef5e0838e410e5e76c4294e
-
Filesize
353KB
MD512aa1abe87beabe7dc37be101d2fc9cb
SHA16e9628df0a40decd9e0fe895c8aececb19cba790
SHA25610188a8c805c77d9b54dd1651feb294f14d6ce0329e3f458473a326a1486a32e
SHA5124d5af7e0738a421451694ee3e66cccd01452396e4acecde4a85b57a981ee74f521fd8bc03329e6f0e30f029d27548b7dca3044f97c8f3fa6242a8f5df583de90
-
Filesize
353KB
MD512aa1abe87beabe7dc37be101d2fc9cb
SHA16e9628df0a40decd9e0fe895c8aececb19cba790
SHA25610188a8c805c77d9b54dd1651feb294f14d6ce0329e3f458473a326a1486a32e
SHA5124d5af7e0738a421451694ee3e66cccd01452396e4acecde4a85b57a981ee74f521fd8bc03329e6f0e30f029d27548b7dca3044f97c8f3fa6242a8f5df583de90