Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/04/2023, 12:17

General

  • Target

    779e567905af383de5280f0257c493124887efe6b2b0570dbe648bbe9619cf7a.exe

  • Size

    695KB

  • MD5

    a8ce422b604bf966ff551cdae918df1e

  • SHA1

    4254f6990b3a8a5a6a5df31bd6a214b957f45560

  • SHA256

    779e567905af383de5280f0257c493124887efe6b2b0570dbe648bbe9619cf7a

  • SHA512

    1fbaea554de1d0c7496e9782bc5994ed229e6db8051e5b4c02ed51a2d82ef12be86f1561d1295929d013fb424eef167243f079c7f7a598735c10b8603aae4e79

  • SSDEEP

    12288:Ay902ddFjT6ZiFLo5SUgVKCeuNjRvN02WNUR5zLkkxvKhAOtBIp:AyjddvdfV7PNjRVhWNe5zLkKvw/Ip

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\779e567905af383de5280f0257c493124887efe6b2b0570dbe648bbe9619cf7a.exe
    "C:\Users\Admin\AppData\Local\Temp\779e567905af383de5280f0257c493124887efe6b2b0570dbe648bbe9619cf7a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4268
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un693585.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un693585.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1048
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\24988870.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\24988870.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:724
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 724 -s 1088
          4⤵
          • Program crash
          PID:4500
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk542934.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk542934.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1092
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 1364
          4⤵
          • Program crash
          PID:760
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si438908.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si438908.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4960
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 724 -ip 724
    1⤵
      PID:1032
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1092 -ip 1092
      1⤵
        PID:2372
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:3832

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si438908.exe

        Filesize

        136KB

        MD5

        73cae2858379cab7e68b9e5bf751c372

        SHA1

        38c375354bda6e5c8fb2579f1ef0416a6c65929a

        SHA256

        e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

        SHA512

        343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si438908.exe

        Filesize

        136KB

        MD5

        73cae2858379cab7e68b9e5bf751c372

        SHA1

        38c375354bda6e5c8fb2579f1ef0416a6c65929a

        SHA256

        e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

        SHA512

        343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un693585.exe

        Filesize

        542KB

        MD5

        dd752c7e954263137e4135f752d75871

        SHA1

        3452de1bee049437571e98754820412f3b80740f

        SHA256

        cb591662c0c1c8ac20b00b40eb4ca15ccc8318ba917b80b50fc61501aea177b4

        SHA512

        c82b266a2abac043be0bab0506fa883efdd01a42a049b746b696c9a2d260b6b30c9dc42d52e54ddde7554e7c255bdb00bc36ccc2c46ac1c9d8e2c29bb797398a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un693585.exe

        Filesize

        542KB

        MD5

        dd752c7e954263137e4135f752d75871

        SHA1

        3452de1bee049437571e98754820412f3b80740f

        SHA256

        cb591662c0c1c8ac20b00b40eb4ca15ccc8318ba917b80b50fc61501aea177b4

        SHA512

        c82b266a2abac043be0bab0506fa883efdd01a42a049b746b696c9a2d260b6b30c9dc42d52e54ddde7554e7c255bdb00bc36ccc2c46ac1c9d8e2c29bb797398a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\24988870.exe

        Filesize

        258KB

        MD5

        0e2647cb58a151ffda5b4faa5f3f1cf9

        SHA1

        fa7cbf839557f1af968d281cdada5075ce287024

        SHA256

        7697d3ff4e1ec69e26872f3d4df78efc7cdf4d8ab7090ed3cd2f1ec333e8e9de

        SHA512

        7aff2e5c7b95cc51e18a3472948a93e8d07d866aec7a01a960d4913311d6307f77f572faf8c8a1e9998db6c02032e0c3f9bf9b568867402e494507a53e686f06

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\24988870.exe

        Filesize

        258KB

        MD5

        0e2647cb58a151ffda5b4faa5f3f1cf9

        SHA1

        fa7cbf839557f1af968d281cdada5075ce287024

        SHA256

        7697d3ff4e1ec69e26872f3d4df78efc7cdf4d8ab7090ed3cd2f1ec333e8e9de

        SHA512

        7aff2e5c7b95cc51e18a3472948a93e8d07d866aec7a01a960d4913311d6307f77f572faf8c8a1e9998db6c02032e0c3f9bf9b568867402e494507a53e686f06

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk542934.exe

        Filesize

        340KB

        MD5

        70c0f83fd51cdee483639098b9f48b93

        SHA1

        b9f2ae9b04f51e75e73744f002ddccbb2984b3b1

        SHA256

        0e2def599ccab0d5dcdb6fcf0b4f719a116444ecf84e606c85e2e9cbf804bab0

        SHA512

        e1d3c6c67683846f1d716692379f18b673423e15fe6150e7298db463aadb91a84abc969b566e4f4b88078344e9d592df4e91b2a234a886b82eb1db0f4351c5e2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk542934.exe

        Filesize

        340KB

        MD5

        70c0f83fd51cdee483639098b9f48b93

        SHA1

        b9f2ae9b04f51e75e73744f002ddccbb2984b3b1

        SHA256

        0e2def599ccab0d5dcdb6fcf0b4f719a116444ecf84e606c85e2e9cbf804bab0

        SHA512

        e1d3c6c67683846f1d716692379f18b673423e15fe6150e7298db463aadb91a84abc969b566e4f4b88078344e9d592df4e91b2a234a886b82eb1db0f4351c5e2

      • memory/724-148-0x0000000002BA0000-0x0000000002BCD000-memory.dmp

        Filesize

        180KB

      • memory/724-149-0x0000000007230000-0x00000000077D4000-memory.dmp

        Filesize

        5.6MB

      • memory/724-150-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/724-151-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/724-152-0x0000000004C10000-0x0000000004C23000-memory.dmp

        Filesize

        76KB

      • memory/724-153-0x0000000004C10000-0x0000000004C23000-memory.dmp

        Filesize

        76KB

      • memory/724-155-0x0000000004C10000-0x0000000004C23000-memory.dmp

        Filesize

        76KB

      • memory/724-157-0x0000000004C10000-0x0000000004C23000-memory.dmp

        Filesize

        76KB

      • memory/724-159-0x0000000004C10000-0x0000000004C23000-memory.dmp

        Filesize

        76KB

      • memory/724-161-0x0000000004C10000-0x0000000004C23000-memory.dmp

        Filesize

        76KB

      • memory/724-163-0x0000000004C10000-0x0000000004C23000-memory.dmp

        Filesize

        76KB

      • memory/724-165-0x0000000004C10000-0x0000000004C23000-memory.dmp

        Filesize

        76KB

      • memory/724-167-0x0000000004C10000-0x0000000004C23000-memory.dmp

        Filesize

        76KB

      • memory/724-169-0x0000000004C10000-0x0000000004C23000-memory.dmp

        Filesize

        76KB

      • memory/724-171-0x0000000004C10000-0x0000000004C23000-memory.dmp

        Filesize

        76KB

      • memory/724-173-0x0000000004C10000-0x0000000004C23000-memory.dmp

        Filesize

        76KB

      • memory/724-175-0x0000000004C10000-0x0000000004C23000-memory.dmp

        Filesize

        76KB

      • memory/724-177-0x0000000004C10000-0x0000000004C23000-memory.dmp

        Filesize

        76KB

      • memory/724-179-0x0000000004C10000-0x0000000004C23000-memory.dmp

        Filesize

        76KB

      • memory/724-180-0x0000000000400000-0x0000000002B9B000-memory.dmp

        Filesize

        39.6MB

      • memory/724-181-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/724-182-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/724-183-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/724-185-0x0000000000400000-0x0000000002B9B000-memory.dmp

        Filesize

        39.6MB

      • memory/1092-190-0x0000000002C80000-0x0000000002CC6000-memory.dmp

        Filesize

        280KB

      • memory/1092-191-0x00000000071C0000-0x00000000071D0000-memory.dmp

        Filesize

        64KB

      • memory/1092-193-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/1092-194-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/1092-192-0x00000000071C0000-0x00000000071D0000-memory.dmp

        Filesize

        64KB

      • memory/1092-196-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/1092-198-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/1092-200-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/1092-202-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/1092-204-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/1092-206-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/1092-208-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/1092-212-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/1092-210-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/1092-214-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/1092-216-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/1092-218-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/1092-220-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/1092-222-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/1092-224-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/1092-226-0x0000000007780000-0x00000000077B5000-memory.dmp

        Filesize

        212KB

      • memory/1092-252-0x00000000071C0000-0x00000000071D0000-memory.dmp

        Filesize

        64KB

      • memory/1092-986-0x0000000009C80000-0x000000000A298000-memory.dmp

        Filesize

        6.1MB

      • memory/1092-987-0x000000000A300000-0x000000000A312000-memory.dmp

        Filesize

        72KB

      • memory/1092-988-0x000000000A320000-0x000000000A42A000-memory.dmp

        Filesize

        1.0MB

      • memory/1092-989-0x00000000071C0000-0x00000000071D0000-memory.dmp

        Filesize

        64KB

      • memory/1092-990-0x000000000A440000-0x000000000A47C000-memory.dmp

        Filesize

        240KB

      • memory/1092-991-0x000000000A740000-0x000000000A7A6000-memory.dmp

        Filesize

        408KB

      • memory/1092-992-0x000000000AE10000-0x000000000AEA2000-memory.dmp

        Filesize

        584KB

      • memory/1092-993-0x000000000AED0000-0x000000000AF46000-memory.dmp

        Filesize

        472KB

      • memory/1092-994-0x000000000AFB0000-0x000000000B172000-memory.dmp

        Filesize

        1.8MB

      • memory/1092-995-0x000000000B180000-0x000000000B6AC000-memory.dmp

        Filesize

        5.2MB

      • memory/1092-996-0x000000000B730000-0x000000000B74E000-memory.dmp

        Filesize

        120KB

      • memory/1092-997-0x0000000004C20000-0x0000000004C70000-memory.dmp

        Filesize

        320KB

      • memory/4960-1003-0x0000000000490000-0x00000000004B8000-memory.dmp

        Filesize

        160KB

      • memory/4960-1004-0x0000000007560000-0x0000000007570000-memory.dmp

        Filesize

        64KB