Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2023, 12:17
Static task
static1
General
-
Target
779e567905af383de5280f0257c493124887efe6b2b0570dbe648bbe9619cf7a.exe
-
Size
695KB
-
MD5
a8ce422b604bf966ff551cdae918df1e
-
SHA1
4254f6990b3a8a5a6a5df31bd6a214b957f45560
-
SHA256
779e567905af383de5280f0257c493124887efe6b2b0570dbe648bbe9619cf7a
-
SHA512
1fbaea554de1d0c7496e9782bc5994ed229e6db8051e5b4c02ed51a2d82ef12be86f1561d1295929d013fb424eef167243f079c7f7a598735c10b8603aae4e79
-
SSDEEP
12288:Ay902ddFjT6ZiFLo5SUgVKCeuNjRvN02WNUR5zLkkxvKhAOtBIp:AyjddvdfV7PNjRVhWNe5zLkKvw/Ip
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 24988870.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 24988870.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 24988870.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 24988870.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 24988870.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 24988870.exe -
Executes dropped EXE 4 IoCs
pid Process 1048 un693585.exe 724 24988870.exe 1092 rk542934.exe 4960 si438908.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 24988870.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 24988870.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 779e567905af383de5280f0257c493124887efe6b2b0570dbe648bbe9619cf7a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 779e567905af383de5280f0257c493124887efe6b2b0570dbe648bbe9619cf7a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un693585.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un693585.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3832 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4500 724 WerFault.exe 85 760 1092 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 724 24988870.exe 724 24988870.exe 1092 rk542934.exe 1092 rk542934.exe 4960 si438908.exe 4960 si438908.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 724 24988870.exe Token: SeDebugPrivilege 1092 rk542934.exe Token: SeDebugPrivilege 4960 si438908.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4268 wrote to memory of 1048 4268 779e567905af383de5280f0257c493124887efe6b2b0570dbe648bbe9619cf7a.exe 84 PID 4268 wrote to memory of 1048 4268 779e567905af383de5280f0257c493124887efe6b2b0570dbe648bbe9619cf7a.exe 84 PID 4268 wrote to memory of 1048 4268 779e567905af383de5280f0257c493124887efe6b2b0570dbe648bbe9619cf7a.exe 84 PID 1048 wrote to memory of 724 1048 un693585.exe 85 PID 1048 wrote to memory of 724 1048 un693585.exe 85 PID 1048 wrote to memory of 724 1048 un693585.exe 85 PID 1048 wrote to memory of 1092 1048 un693585.exe 91 PID 1048 wrote to memory of 1092 1048 un693585.exe 91 PID 1048 wrote to memory of 1092 1048 un693585.exe 91 PID 4268 wrote to memory of 4960 4268 779e567905af383de5280f0257c493124887efe6b2b0570dbe648bbe9619cf7a.exe 94 PID 4268 wrote to memory of 4960 4268 779e567905af383de5280f0257c493124887efe6b2b0570dbe648bbe9619cf7a.exe 94 PID 4268 wrote to memory of 4960 4268 779e567905af383de5280f0257c493124887efe6b2b0570dbe648bbe9619cf7a.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\779e567905af383de5280f0257c493124887efe6b2b0570dbe648bbe9619cf7a.exe"C:\Users\Admin\AppData\Local\Temp\779e567905af383de5280f0257c493124887efe6b2b0570dbe648bbe9619cf7a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un693585.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un693585.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\24988870.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\24988870.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 724 -s 10884⤵
- Program crash
PID:4500
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk542934.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk542934.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 13644⤵
- Program crash
PID:760
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si438908.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si438908.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 724 -ip 7241⤵PID:1032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1092 -ip 10921⤵PID:2372
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3832
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
542KB
MD5dd752c7e954263137e4135f752d75871
SHA13452de1bee049437571e98754820412f3b80740f
SHA256cb591662c0c1c8ac20b00b40eb4ca15ccc8318ba917b80b50fc61501aea177b4
SHA512c82b266a2abac043be0bab0506fa883efdd01a42a049b746b696c9a2d260b6b30c9dc42d52e54ddde7554e7c255bdb00bc36ccc2c46ac1c9d8e2c29bb797398a
-
Filesize
542KB
MD5dd752c7e954263137e4135f752d75871
SHA13452de1bee049437571e98754820412f3b80740f
SHA256cb591662c0c1c8ac20b00b40eb4ca15ccc8318ba917b80b50fc61501aea177b4
SHA512c82b266a2abac043be0bab0506fa883efdd01a42a049b746b696c9a2d260b6b30c9dc42d52e54ddde7554e7c255bdb00bc36ccc2c46ac1c9d8e2c29bb797398a
-
Filesize
258KB
MD50e2647cb58a151ffda5b4faa5f3f1cf9
SHA1fa7cbf839557f1af968d281cdada5075ce287024
SHA2567697d3ff4e1ec69e26872f3d4df78efc7cdf4d8ab7090ed3cd2f1ec333e8e9de
SHA5127aff2e5c7b95cc51e18a3472948a93e8d07d866aec7a01a960d4913311d6307f77f572faf8c8a1e9998db6c02032e0c3f9bf9b568867402e494507a53e686f06
-
Filesize
258KB
MD50e2647cb58a151ffda5b4faa5f3f1cf9
SHA1fa7cbf839557f1af968d281cdada5075ce287024
SHA2567697d3ff4e1ec69e26872f3d4df78efc7cdf4d8ab7090ed3cd2f1ec333e8e9de
SHA5127aff2e5c7b95cc51e18a3472948a93e8d07d866aec7a01a960d4913311d6307f77f572faf8c8a1e9998db6c02032e0c3f9bf9b568867402e494507a53e686f06
-
Filesize
340KB
MD570c0f83fd51cdee483639098b9f48b93
SHA1b9f2ae9b04f51e75e73744f002ddccbb2984b3b1
SHA2560e2def599ccab0d5dcdb6fcf0b4f719a116444ecf84e606c85e2e9cbf804bab0
SHA512e1d3c6c67683846f1d716692379f18b673423e15fe6150e7298db463aadb91a84abc969b566e4f4b88078344e9d592df4e91b2a234a886b82eb1db0f4351c5e2
-
Filesize
340KB
MD570c0f83fd51cdee483639098b9f48b93
SHA1b9f2ae9b04f51e75e73744f002ddccbb2984b3b1
SHA2560e2def599ccab0d5dcdb6fcf0b4f719a116444ecf84e606c85e2e9cbf804bab0
SHA512e1d3c6c67683846f1d716692379f18b673423e15fe6150e7298db463aadb91a84abc969b566e4f4b88078344e9d592df4e91b2a234a886b82eb1db0f4351c5e2