Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/04/2023, 11:03 UTC

General

  • Target

    2085c358041a9ffb3785927f526d278e64210c83c82d53e523975640677acf48.exe

  • Size

    707KB

  • MD5

    5a1d4d55dcefe885cfa2cc616d3525d6

  • SHA1

    c782a2da7104a5c6e57ad931de2091a3098afa09

  • SHA256

    2085c358041a9ffb3785927f526d278e64210c83c82d53e523975640677acf48

  • SHA512

    0ad43060e8317fddf52aa9272120ad48f82f1c1f6b111c0a323688ced5b655b99e97e27d988817bfcb0094908290d00180014531c70b3ee5d3cb0276c5e79e43

  • SSDEEP

    12288:qy900lzliCK+x0TwKbLjKAYpvF2djxScEIofQDsFSU3XWFDGSTynPamFwtEA3zRR:qyRzECKc5f2tMcEffQDsEiTPzg9zRdn

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2085c358041a9ffb3785927f526d278e64210c83c82d53e523975640677acf48.exe
    "C:\Users\Admin\AppData\Local\Temp\2085c358041a9ffb3785927f526d278e64210c83c82d53e523975640677acf48.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4956
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un051447.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un051447.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4484
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\90804730.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\90804730.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1772
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1772 -s 1080
          4⤵
          • Program crash
          PID:932
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk101006.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk101006.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3752
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 2072
          4⤵
          • Program crash
          PID:4832
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si871235.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si871235.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:864
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1772 -ip 1772
    1⤵
      PID:4492
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3752 -ip 3752
      1⤵
        PID:3164

      Network

      • flag-us
        DNS
        217.106.137.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        217.106.137.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        95.221.229.192.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        95.221.229.192.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        143.248.161.185.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        143.248.161.185.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        73.254.224.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        73.254.224.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        1.202.248.87.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        1.202.248.87.in-addr.arpa
        IN PTR
        Response
        1.202.248.87.in-addr.arpa
        IN PTR
        https-87-248-202-1amsllnwnet
      • 93.184.221.240:80
        260 B
        5
      • 93.184.220.29:80
        260 B
        5
      • 185.161.248.143:38452
        rk101006.exe
        10.8kB
        7.9kB
        18
        15
      • 93.184.221.240:80
        322 B
        7
      • 185.161.248.143:38452
        si871235.exe
        5.6kB
        7.6kB
        14
        11
      • 52.152.110.14:443
        260 B
        5
      • 104.208.16.90:443
        322 B
        7
      • 52.152.110.14:443
        260 B
        5
      • 93.184.221.240:80
        322 B
        7
      • 52.152.110.14:443
        260 B
        5
      • 173.223.113.164:443
        322 B
        7
      • 173.223.113.131:80
        322 B
        7
      • 204.79.197.203:80
        322 B
        7
      • 52.152.110.14:443
        260 B
        5
      • 52.152.110.14:443
        260 B
        5
      • 52.152.110.14:443
        260 B
        5
      • 8.8.8.8:53
        217.106.137.52.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        217.106.137.52.in-addr.arpa

      • 8.8.8.8:53
        95.221.229.192.in-addr.arpa
        dns
        73 B
        144 B
        1
        1

        DNS Request

        95.221.229.192.in-addr.arpa

      • 8.8.8.8:53
        143.248.161.185.in-addr.arpa
        dns
        74 B
        134 B
        1
        1

        DNS Request

        143.248.161.185.in-addr.arpa

      • 8.8.8.8:53
        73.254.224.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        73.254.224.20.in-addr.arpa

      • 8.8.8.8:53
        1.202.248.87.in-addr.arpa
        dns
        71 B
        116 B
        1
        1

        DNS Request

        1.202.248.87.in-addr.arpa

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si871235.exe

        Filesize

        136KB

        MD5

        73cae2858379cab7e68b9e5bf751c372

        SHA1

        38c375354bda6e5c8fb2579f1ef0416a6c65929a

        SHA256

        e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

        SHA512

        343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si871235.exe

        Filesize

        136KB

        MD5

        73cae2858379cab7e68b9e5bf751c372

        SHA1

        38c375354bda6e5c8fb2579f1ef0416a6c65929a

        SHA256

        e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

        SHA512

        343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un051447.exe

        Filesize

        553KB

        MD5

        7d87605ba65c9b22678d6e80dee7f777

        SHA1

        398ce8a75091e8a2117ca7b7b313f84f0bb58b35

        SHA256

        925ff38bd0a53f0c9930f258db335723b17f2eb885e278fae9708f430a775b87

        SHA512

        15e293f20df10ed2a3feecff3f006be0787beb276cdb94e72f55d787b1e85cc8a02722cae24df5493e70ae49a9ace142ea0c5d356e188e32c392197bcb03d9d9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un051447.exe

        Filesize

        553KB

        MD5

        7d87605ba65c9b22678d6e80dee7f777

        SHA1

        398ce8a75091e8a2117ca7b7b313f84f0bb58b35

        SHA256

        925ff38bd0a53f0c9930f258db335723b17f2eb885e278fae9708f430a775b87

        SHA512

        15e293f20df10ed2a3feecff3f006be0787beb276cdb94e72f55d787b1e85cc8a02722cae24df5493e70ae49a9ace142ea0c5d356e188e32c392197bcb03d9d9

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\90804730.exe

        Filesize

        258KB

        MD5

        ad2ad38410cf2d6ded634c128b7310f8

        SHA1

        716732ad5cee55cbcef9e669c1c72f227815bf60

        SHA256

        a97e5ee697bdfe339dce50f00c806c5cd040602d486a7786919937daf1003ae4

        SHA512

        c833e9125997cdbd61988006092a78c3350954556478ad04316c0029244b24be592bc3d09d079c22de7baa9bcfd0099cf02d2791a42f5b7f73fabc9af7a1adc4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\90804730.exe

        Filesize

        258KB

        MD5

        ad2ad38410cf2d6ded634c128b7310f8

        SHA1

        716732ad5cee55cbcef9e669c1c72f227815bf60

        SHA256

        a97e5ee697bdfe339dce50f00c806c5cd040602d486a7786919937daf1003ae4

        SHA512

        c833e9125997cdbd61988006092a78c3350954556478ad04316c0029244b24be592bc3d09d079c22de7baa9bcfd0099cf02d2791a42f5b7f73fabc9af7a1adc4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk101006.exe

        Filesize

        353KB

        MD5

        c692d8d179eae7759ad76a44cbe6bc7c

        SHA1

        38e4feab036ec5865a0632ec43c5d63f4fc8c6c1

        SHA256

        d955f7c67230e4d1a63e39ec914079f05eb912f42d6dccd5f183e45852b6ee04

        SHA512

        21d36a41a6fe0d34bb695c6f27753a5ede904028bd0fdafde27afe31d45689f62d22a466a806ed4a7711c25f048c04fb87bd1566da5805e11eb779c0c134ce0d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk101006.exe

        Filesize

        353KB

        MD5

        c692d8d179eae7759ad76a44cbe6bc7c

        SHA1

        38e4feab036ec5865a0632ec43c5d63f4fc8c6c1

        SHA256

        d955f7c67230e4d1a63e39ec914079f05eb912f42d6dccd5f183e45852b6ee04

        SHA512

        21d36a41a6fe0d34bb695c6f27753a5ede904028bd0fdafde27afe31d45689f62d22a466a806ed4a7711c25f048c04fb87bd1566da5805e11eb779c0c134ce0d

      • memory/864-1006-0x0000000007CE0000-0x0000000007CF0000-memory.dmp

        Filesize

        64KB

      • memory/864-1005-0x0000000000FD0000-0x0000000000FF8000-memory.dmp

        Filesize

        160KB

      • memory/1772-156-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-170-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-152-0x0000000007240000-0x0000000007250000-memory.dmp

        Filesize

        64KB

      • memory/1772-151-0x0000000007240000-0x0000000007250000-memory.dmp

        Filesize

        64KB

      • memory/1772-153-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-154-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-149-0x0000000002CA0000-0x0000000002CCD000-memory.dmp

        Filesize

        180KB

      • memory/1772-158-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-160-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-162-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-164-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-166-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-168-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-150-0x0000000007240000-0x0000000007250000-memory.dmp

        Filesize

        64KB

      • memory/1772-172-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-174-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-176-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-178-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-180-0x0000000004BD0000-0x0000000004BE3000-memory.dmp

        Filesize

        76KB

      • memory/1772-181-0x0000000000400000-0x0000000002B9B000-memory.dmp

        Filesize

        39.6MB

      • memory/1772-182-0x0000000007240000-0x0000000007250000-memory.dmp

        Filesize

        64KB

      • memory/1772-183-0x0000000007240000-0x0000000007250000-memory.dmp

        Filesize

        64KB

      • memory/1772-184-0x0000000007240000-0x0000000007250000-memory.dmp

        Filesize

        64KB

      • memory/1772-186-0x0000000000400000-0x0000000002B9B000-memory.dmp

        Filesize

        39.6MB

      • memory/1772-148-0x0000000007250000-0x00000000077F4000-memory.dmp

        Filesize

        5.6MB

      • memory/3752-191-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-194-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-196-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-198-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-200-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-202-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-204-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-206-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-208-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-210-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-212-0x0000000002DE0000-0x0000000002E26000-memory.dmp

        Filesize

        280KB

      • memory/3752-214-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/3752-217-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-216-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/3752-218-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/3752-220-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-213-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-222-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-224-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-226-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-228-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-987-0x0000000009C70000-0x000000000A288000-memory.dmp

        Filesize

        6.1MB

      • memory/3752-988-0x000000000A310000-0x000000000A322000-memory.dmp

        Filesize

        72KB

      • memory/3752-989-0x000000000A330000-0x000000000A43A000-memory.dmp

        Filesize

        1.0MB

      • memory/3752-990-0x000000000A450000-0x000000000A48C000-memory.dmp

        Filesize

        240KB

      • memory/3752-991-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/3752-992-0x000000000A750000-0x000000000A7B6000-memory.dmp

        Filesize

        408KB

      • memory/3752-993-0x000000000AE10000-0x000000000AEA2000-memory.dmp

        Filesize

        584KB

      • memory/3752-994-0x000000000AED0000-0x000000000AF20000-memory.dmp

        Filesize

        320KB

      • memory/3752-995-0x000000000AF30000-0x000000000AFA6000-memory.dmp

        Filesize

        472KB

      • memory/3752-192-0x0000000004E40000-0x0000000004E75000-memory.dmp

        Filesize

        212KB

      • memory/3752-996-0x000000000B0E0000-0x000000000B0FE000-memory.dmp

        Filesize

        120KB

      • memory/3752-997-0x000000000B1A0000-0x000000000B362000-memory.dmp

        Filesize

        1.8MB

      • memory/3752-998-0x000000000B380000-0x000000000B8AC000-memory.dmp

        Filesize

        5.2MB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.