Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    51s
  • max time network
    64s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25/04/2023, 13:21

General

  • Target

    c942d4ab3687a71706558cdc35eb348b71fb49fc5acc29812cc0e9694eb0553c.exe

  • Size

    694KB

  • MD5

    6ecf96cf587d07a5ddb15fad7714ef93

  • SHA1

    c0442e36bf6da21626542f76f2e62565a6b305fa

  • SHA256

    c942d4ab3687a71706558cdc35eb348b71fb49fc5acc29812cc0e9694eb0553c

  • SHA512

    fbff217f77e29f5eadaaa261250b04ab6333b49a90907f649d3aed7b4b474ef722c02b4ddc26053dcf74b0b95a6cee7e25b7f5902e60b3a6bb67c9a75d22237f

  • SSDEEP

    12288:iy902u7FLbAdk71oaRa8jDh5V/TNKtUgFD5UboWr2/AskaGOjUe5vleu2KT9oK+z:iyRUFha8zBTNOUgFD5fVGOjUKWKTyKEt

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c942d4ab3687a71706558cdc35eb348b71fb49fc5acc29812cc0e9694eb0553c.exe
    "C:\Users\Admin\AppData\Local\Temp\c942d4ab3687a71706558cdc35eb348b71fb49fc5acc29812cc0e9694eb0553c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un358578.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un358578.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2144
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\76495545.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\76495545.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3200
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk144728.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk144728.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1972
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si461297.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si461297.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2940

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si461297.exe

    Filesize

    136KB

    MD5

    73cae2858379cab7e68b9e5bf751c372

    SHA1

    38c375354bda6e5c8fb2579f1ef0416a6c65929a

    SHA256

    e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

    SHA512

    343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si461297.exe

    Filesize

    136KB

    MD5

    73cae2858379cab7e68b9e5bf751c372

    SHA1

    38c375354bda6e5c8fb2579f1ef0416a6c65929a

    SHA256

    e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

    SHA512

    343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un358578.exe

    Filesize

    540KB

    MD5

    cbf734b21b7af9fdeec99a8fad908cff

    SHA1

    e76e42938b27e7cc608e08e6a5c4a62c933cc59c

    SHA256

    4719cc08e429afcb894730b0f3b1c31b1077f31422384bab96eb77c29c13ce24

    SHA512

    6606dc9329a32e3d85e996515c0bdb21dbd9e2f7a204ca1967d0303e357a0fa66681d0e259b9fc65a1396e2e052b3f6122ed5c298d532e87b12f92e32b810c60

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un358578.exe

    Filesize

    540KB

    MD5

    cbf734b21b7af9fdeec99a8fad908cff

    SHA1

    e76e42938b27e7cc608e08e6a5c4a62c933cc59c

    SHA256

    4719cc08e429afcb894730b0f3b1c31b1077f31422384bab96eb77c29c13ce24

    SHA512

    6606dc9329a32e3d85e996515c0bdb21dbd9e2f7a204ca1967d0303e357a0fa66681d0e259b9fc65a1396e2e052b3f6122ed5c298d532e87b12f92e32b810c60

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\76495545.exe

    Filesize

    257KB

    MD5

    6fbfd7fbbef54b544177047189ecb7db

    SHA1

    26d5c495f1f10f35a51bf7515c3daeec6e8c117f

    SHA256

    9b97479c86a0f842706d16a85eabd58a332db094ffea7f435703efdf7daafb92

    SHA512

    1f7bdc59a6096ae06893c19206263ee18e1160913d26d81961cc93d640eca8dc9d0aa1e1bf6c047dec0a12b3e7d8cf20c41fd58c2040834babb94c292c7b6c87

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\76495545.exe

    Filesize

    257KB

    MD5

    6fbfd7fbbef54b544177047189ecb7db

    SHA1

    26d5c495f1f10f35a51bf7515c3daeec6e8c117f

    SHA256

    9b97479c86a0f842706d16a85eabd58a332db094ffea7f435703efdf7daafb92

    SHA512

    1f7bdc59a6096ae06893c19206263ee18e1160913d26d81961cc93d640eca8dc9d0aa1e1bf6c047dec0a12b3e7d8cf20c41fd58c2040834babb94c292c7b6c87

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk144728.exe

    Filesize

    340KB

    MD5

    f55ec0216ca5329b640327fdbd4d6761

    SHA1

    3f16aef6a0f391b3cf41bc85d0cac464377b3f14

    SHA256

    9d6e35068d6328248d81d4d1415c64fbb804e7d4fe467ae995003db4cb702c24

    SHA512

    5778508a4b49dcd7f1f4a1031a2f6f4ccf1f64e665ae37e6ec0b6ab0e81b3bff888f3633b51323739ed88ae0efac6808ef0b3c16430e2cd435425067cbb80a21

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk144728.exe

    Filesize

    340KB

    MD5

    f55ec0216ca5329b640327fdbd4d6761

    SHA1

    3f16aef6a0f391b3cf41bc85d0cac464377b3f14

    SHA256

    9d6e35068d6328248d81d4d1415c64fbb804e7d4fe467ae995003db4cb702c24

    SHA512

    5778508a4b49dcd7f1f4a1031a2f6f4ccf1f64e665ae37e6ec0b6ab0e81b3bff888f3633b51323739ed88ae0efac6808ef0b3c16430e2cd435425067cbb80a21

  • memory/1972-979-0x000000000A210000-0x000000000A816000-memory.dmp

    Filesize

    6.0MB

  • memory/1972-980-0x0000000009C00000-0x0000000009C12000-memory.dmp

    Filesize

    72KB

  • memory/1972-995-0x0000000007270000-0x0000000007280000-memory.dmp

    Filesize

    64KB

  • memory/1972-991-0x0000000004C10000-0x0000000004C60000-memory.dmp

    Filesize

    320KB

  • memory/1972-192-0x0000000007270000-0x0000000007280000-memory.dmp

    Filesize

    64KB

  • memory/1972-990-0x000000000B6E0000-0x000000000B6FE000-memory.dmp

    Filesize

    120KB

  • memory/1972-989-0x000000000B080000-0x000000000B5AC000-memory.dmp

    Filesize

    5.2MB

  • memory/1972-988-0x000000000AEA0000-0x000000000B062000-memory.dmp

    Filesize

    1.8MB

  • memory/1972-195-0x0000000007160000-0x0000000007195000-memory.dmp

    Filesize

    212KB

  • memory/1972-986-0x000000000AD40000-0x000000000ADD2000-memory.dmp

    Filesize

    584KB

  • memory/1972-985-0x000000000A050000-0x000000000A0B6000-memory.dmp

    Filesize

    408KB

  • memory/1972-984-0x0000000007270000-0x0000000007280000-memory.dmp

    Filesize

    64KB

  • memory/1972-983-0x0000000009EC0000-0x0000000009F0B000-memory.dmp

    Filesize

    300KB

  • memory/1972-982-0x0000000009D40000-0x0000000009D7E000-memory.dmp

    Filesize

    248KB

  • memory/1972-981-0x0000000009C20000-0x0000000009D2A000-memory.dmp

    Filesize

    1.0MB

  • memory/1972-220-0x0000000007160000-0x0000000007195000-memory.dmp

    Filesize

    212KB

  • memory/1972-218-0x0000000007160000-0x0000000007195000-memory.dmp

    Filesize

    212KB

  • memory/1972-216-0x0000000007160000-0x0000000007195000-memory.dmp

    Filesize

    212KB

  • memory/1972-214-0x0000000007160000-0x0000000007195000-memory.dmp

    Filesize

    212KB

  • memory/1972-212-0x0000000007160000-0x0000000007195000-memory.dmp

    Filesize

    212KB

  • memory/1972-206-0x0000000007160000-0x0000000007195000-memory.dmp

    Filesize

    212KB

  • memory/1972-210-0x0000000007160000-0x0000000007195000-memory.dmp

    Filesize

    212KB

  • memory/1972-208-0x0000000007160000-0x0000000007195000-memory.dmp

    Filesize

    212KB

  • memory/1972-204-0x0000000007160000-0x0000000007195000-memory.dmp

    Filesize

    212KB

  • memory/1972-202-0x0000000007160000-0x0000000007195000-memory.dmp

    Filesize

    212KB

  • memory/1972-181-0x00000000070E0000-0x000000000711C000-memory.dmp

    Filesize

    240KB

  • memory/1972-182-0x0000000007160000-0x000000000719A000-memory.dmp

    Filesize

    232KB

  • memory/1972-183-0x0000000007160000-0x0000000007195000-memory.dmp

    Filesize

    212KB

  • memory/1972-186-0x0000000007160000-0x0000000007195000-memory.dmp

    Filesize

    212KB

  • memory/1972-188-0x0000000007160000-0x0000000007195000-memory.dmp

    Filesize

    212KB

  • memory/1972-184-0x0000000007160000-0x0000000007195000-memory.dmp

    Filesize

    212KB

  • memory/1972-190-0x0000000002C80000-0x0000000002CC6000-memory.dmp

    Filesize

    280KB

  • memory/1972-200-0x0000000007160000-0x0000000007195000-memory.dmp

    Filesize

    212KB

  • memory/1972-194-0x0000000007270000-0x0000000007280000-memory.dmp

    Filesize

    64KB

  • memory/1972-987-0x000000000ADE0000-0x000000000AE56000-memory.dmp

    Filesize

    472KB

  • memory/1972-191-0x0000000007160000-0x0000000007195000-memory.dmp

    Filesize

    212KB

  • memory/1972-197-0x0000000007270000-0x0000000007280000-memory.dmp

    Filesize

    64KB

  • memory/1972-198-0x0000000007160000-0x0000000007195000-memory.dmp

    Filesize

    212KB

  • memory/2940-999-0x00000000000D0000-0x00000000000F8000-memory.dmp

    Filesize

    160KB

  • memory/2940-1001-0x0000000006DF0000-0x0000000006E00000-memory.dmp

    Filesize

    64KB

  • memory/2940-1000-0x0000000006E80000-0x0000000006ECB000-memory.dmp

    Filesize

    300KB

  • memory/3200-160-0x00000000049D0000-0x00000000049E3000-memory.dmp

    Filesize

    76KB

  • memory/3200-158-0x00000000049D0000-0x00000000049E3000-memory.dmp

    Filesize

    76KB

  • memory/3200-173-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/3200-172-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/3200-171-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/3200-170-0x00000000049D0000-0x00000000049E3000-memory.dmp

    Filesize

    76KB

  • memory/3200-168-0x00000000049D0000-0x00000000049E3000-memory.dmp

    Filesize

    76KB

  • memory/3200-166-0x00000000049D0000-0x00000000049E3000-memory.dmp

    Filesize

    76KB

  • memory/3200-138-0x0000000002C70000-0x0000000002C9D000-memory.dmp

    Filesize

    180KB

  • memory/3200-141-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/3200-144-0x00000000049D0000-0x00000000049E3000-memory.dmp

    Filesize

    76KB

  • memory/3200-164-0x00000000049D0000-0x00000000049E3000-memory.dmp

    Filesize

    76KB

  • memory/3200-156-0x00000000049D0000-0x00000000049E3000-memory.dmp

    Filesize

    76KB

  • memory/3200-174-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/3200-162-0x00000000049D0000-0x00000000049E3000-memory.dmp

    Filesize

    76KB

  • memory/3200-154-0x00000000049D0000-0x00000000049E3000-memory.dmp

    Filesize

    76KB

  • memory/3200-152-0x00000000049D0000-0x00000000049E3000-memory.dmp

    Filesize

    76KB

  • memory/3200-150-0x00000000049D0000-0x00000000049E3000-memory.dmp

    Filesize

    76KB

  • memory/3200-148-0x00000000049D0000-0x00000000049E3000-memory.dmp

    Filesize

    76KB

  • memory/3200-146-0x00000000049D0000-0x00000000049E3000-memory.dmp

    Filesize

    76KB

  • memory/3200-143-0x00000000049D0000-0x00000000049E3000-memory.dmp

    Filesize

    76KB

  • memory/3200-142-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/3200-137-0x0000000007200000-0x00000000076FE000-memory.dmp

    Filesize

    5.0MB

  • memory/3200-136-0x0000000004820000-0x000000000483A000-memory.dmp

    Filesize

    104KB

  • memory/3200-176-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/3200-139-0x00000000049D0000-0x00000000049E8000-memory.dmp

    Filesize

    96KB

  • memory/3200-140-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB