Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    54s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25/04/2023, 15:43

General

  • Target

    6826552d36ab070a5884983592e8631ac539e10f4afd83958f828e9dac553df1.exe

  • Size

    694KB

  • MD5

    c110e6a3af5903b1bab09d5232992ae9

  • SHA1

    7592231f3180394f68d62f4da811918dba15ae89

  • SHA256

    6826552d36ab070a5884983592e8631ac539e10f4afd83958f828e9dac553df1

  • SHA512

    86ba11fa835150e3ec37a87eb410f0bb6cf158d47a057a6a71c95e794b21dcfaaf83c1a17858380222a2045d3ff987cd43959e36644bbd7f607c5f50fe552a20

  • SSDEEP

    12288:Qy90aya3wDcqD38jvwfIjYCNr8NoMyhlOEwi6WDvolJUNt0ttOTzYEF1WJbE9X:QyvAAqD3LijZ8NYlh6WDGSz98lEB

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6826552d36ab070a5884983592e8631ac539e10f4afd83958f828e9dac553df1.exe
    "C:\Users\Admin\AppData\Local\Temp\6826552d36ab070a5884983592e8631ac539e10f4afd83958f828e9dac553df1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4204
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un468387.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un468387.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\92386976.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\92386976.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2496
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk956594.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk956594.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3552
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si980348.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si980348.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si980348.exe

    Filesize

    136KB

    MD5

    73cae2858379cab7e68b9e5bf751c372

    SHA1

    38c375354bda6e5c8fb2579f1ef0416a6c65929a

    SHA256

    e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

    SHA512

    343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si980348.exe

    Filesize

    136KB

    MD5

    73cae2858379cab7e68b9e5bf751c372

    SHA1

    38c375354bda6e5c8fb2579f1ef0416a6c65929a

    SHA256

    e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

    SHA512

    343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un468387.exe

    Filesize

    540KB

    MD5

    c7a9f5494a87724f26f57cdc5b007eb4

    SHA1

    5205961ad2f111b61a8f0855a415351a5cfc772c

    SHA256

    5e4486e8ecd8c8442671d35c873dfbf1cb2fd5e5dcd485a3303abf6041e2569f

    SHA512

    ba6c965d21a8e14ad83511599c1b9cb6e0c320f9552507af13bc35651a57132fa0da9bfd6d1ea4e9fb5c59d4fe44bf9bae04171e5869c950e20c020e7d1e67eb

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un468387.exe

    Filesize

    540KB

    MD5

    c7a9f5494a87724f26f57cdc5b007eb4

    SHA1

    5205961ad2f111b61a8f0855a415351a5cfc772c

    SHA256

    5e4486e8ecd8c8442671d35c873dfbf1cb2fd5e5dcd485a3303abf6041e2569f

    SHA512

    ba6c965d21a8e14ad83511599c1b9cb6e0c320f9552507af13bc35651a57132fa0da9bfd6d1ea4e9fb5c59d4fe44bf9bae04171e5869c950e20c020e7d1e67eb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\92386976.exe

    Filesize

    258KB

    MD5

    3ac388b5d43ca3960ad4c4258af70f27

    SHA1

    96dbbcd539b8caac6fde6c48c09f2c9ebeab4bb4

    SHA256

    6b3670b5d9e482bb6ed9c0450219ffc54d1c8d660ae7db12d08c004bf67f1ce9

    SHA512

    1a5e8f1ece136495b1617febf72ad8cdcb46c5662827a6940b8d7ea2ca98254bbeb1e5e61ec66b3c6177db0d32a026c5d35f83b1b5dd5ca35f2f4e2d6f64b396

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\92386976.exe

    Filesize

    258KB

    MD5

    3ac388b5d43ca3960ad4c4258af70f27

    SHA1

    96dbbcd539b8caac6fde6c48c09f2c9ebeab4bb4

    SHA256

    6b3670b5d9e482bb6ed9c0450219ffc54d1c8d660ae7db12d08c004bf67f1ce9

    SHA512

    1a5e8f1ece136495b1617febf72ad8cdcb46c5662827a6940b8d7ea2ca98254bbeb1e5e61ec66b3c6177db0d32a026c5d35f83b1b5dd5ca35f2f4e2d6f64b396

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk956594.exe

    Filesize

    340KB

    MD5

    84180cabdb9114ca95ad1a4bff3526a6

    SHA1

    4c31cc7eed6562bf6ed46cb5d134b7116b175452

    SHA256

    8278b80e3cac92143f7711f28f5d1600d3e0e1ae79f7e0172beef51a740a2b87

    SHA512

    29bca05ab3ba68dce60c847f88feb110f0baeae73d203a94a99ab86246b5e0a7b6487954976e5d727cf7ead640da23e10c525f031821622807f800f1efceb935

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk956594.exe

    Filesize

    340KB

    MD5

    84180cabdb9114ca95ad1a4bff3526a6

    SHA1

    4c31cc7eed6562bf6ed46cb5d134b7116b175452

    SHA256

    8278b80e3cac92143f7711f28f5d1600d3e0e1ae79f7e0172beef51a740a2b87

    SHA512

    29bca05ab3ba68dce60c847f88feb110f0baeae73d203a94a99ab86246b5e0a7b6487954976e5d727cf7ead640da23e10c525f031821622807f800f1efceb935

  • memory/2496-134-0x0000000002C70000-0x0000000002C9D000-memory.dmp

    Filesize

    180KB

  • memory/2496-135-0x0000000004890000-0x00000000048AA000-memory.dmp

    Filesize

    104KB

  • memory/2496-136-0x00000000071C0000-0x00000000076BE000-memory.dmp

    Filesize

    5.0MB

  • memory/2496-137-0x00000000070D0000-0x00000000070E8000-memory.dmp

    Filesize

    96KB

  • memory/2496-138-0x00000000071B0000-0x00000000071C0000-memory.dmp

    Filesize

    64KB

  • memory/2496-140-0x00000000071B0000-0x00000000071C0000-memory.dmp

    Filesize

    64KB

  • memory/2496-139-0x00000000071B0000-0x00000000071C0000-memory.dmp

    Filesize

    64KB

  • memory/2496-141-0x00000000070D0000-0x00000000070E3000-memory.dmp

    Filesize

    76KB

  • memory/2496-142-0x00000000070D0000-0x00000000070E3000-memory.dmp

    Filesize

    76KB

  • memory/2496-144-0x00000000070D0000-0x00000000070E3000-memory.dmp

    Filesize

    76KB

  • memory/2496-146-0x00000000070D0000-0x00000000070E3000-memory.dmp

    Filesize

    76KB

  • memory/2496-148-0x00000000070D0000-0x00000000070E3000-memory.dmp

    Filesize

    76KB

  • memory/2496-150-0x00000000070D0000-0x00000000070E3000-memory.dmp

    Filesize

    76KB

  • memory/2496-152-0x00000000070D0000-0x00000000070E3000-memory.dmp

    Filesize

    76KB

  • memory/2496-154-0x00000000070D0000-0x00000000070E3000-memory.dmp

    Filesize

    76KB

  • memory/2496-156-0x00000000070D0000-0x00000000070E3000-memory.dmp

    Filesize

    76KB

  • memory/2496-158-0x00000000070D0000-0x00000000070E3000-memory.dmp

    Filesize

    76KB

  • memory/2496-160-0x00000000070D0000-0x00000000070E3000-memory.dmp

    Filesize

    76KB

  • memory/2496-162-0x00000000070D0000-0x00000000070E3000-memory.dmp

    Filesize

    76KB

  • memory/2496-164-0x00000000070D0000-0x00000000070E3000-memory.dmp

    Filesize

    76KB

  • memory/2496-166-0x00000000070D0000-0x00000000070E3000-memory.dmp

    Filesize

    76KB

  • memory/2496-168-0x00000000070D0000-0x00000000070E3000-memory.dmp

    Filesize

    76KB

  • memory/2496-169-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/2496-170-0x0000000002C70000-0x0000000002C9D000-memory.dmp

    Filesize

    180KB

  • memory/2496-171-0x00000000071B0000-0x00000000071C0000-memory.dmp

    Filesize

    64KB

  • memory/2496-173-0x00000000071B0000-0x00000000071C0000-memory.dmp

    Filesize

    64KB

  • memory/2496-174-0x00000000071B0000-0x00000000071C0000-memory.dmp

    Filesize

    64KB

  • memory/2496-175-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/3552-180-0x0000000004780000-0x00000000047BC000-memory.dmp

    Filesize

    240KB

  • memory/3552-181-0x0000000004820000-0x000000000485A000-memory.dmp

    Filesize

    232KB

  • memory/3552-183-0x0000000004820000-0x0000000004855000-memory.dmp

    Filesize

    212KB

  • memory/3552-182-0x0000000004820000-0x0000000004855000-memory.dmp

    Filesize

    212KB

  • memory/3552-185-0x0000000004820000-0x0000000004855000-memory.dmp

    Filesize

    212KB

  • memory/3552-187-0x0000000004820000-0x0000000004855000-memory.dmp

    Filesize

    212KB

  • memory/3552-189-0x0000000004820000-0x0000000004855000-memory.dmp

    Filesize

    212KB

  • memory/3552-191-0x0000000004820000-0x0000000004855000-memory.dmp

    Filesize

    212KB

  • memory/3552-193-0x0000000004820000-0x0000000004855000-memory.dmp

    Filesize

    212KB

  • memory/3552-195-0x0000000004820000-0x0000000004855000-memory.dmp

    Filesize

    212KB

  • memory/3552-197-0x0000000004820000-0x0000000004855000-memory.dmp

    Filesize

    212KB

  • memory/3552-199-0x0000000004820000-0x0000000004855000-memory.dmp

    Filesize

    212KB

  • memory/3552-201-0x0000000004820000-0x0000000004855000-memory.dmp

    Filesize

    212KB

  • memory/3552-203-0x0000000004820000-0x0000000004855000-memory.dmp

    Filesize

    212KB

  • memory/3552-205-0x0000000004820000-0x0000000004855000-memory.dmp

    Filesize

    212KB

  • memory/3552-207-0x0000000004820000-0x0000000004855000-memory.dmp

    Filesize

    212KB

  • memory/3552-209-0x0000000004820000-0x0000000004855000-memory.dmp

    Filesize

    212KB

  • memory/3552-211-0x0000000004820000-0x0000000004855000-memory.dmp

    Filesize

    212KB

  • memory/3552-213-0x0000000004820000-0x0000000004855000-memory.dmp

    Filesize

    212KB

  • memory/3552-215-0x0000000004820000-0x0000000004855000-memory.dmp

    Filesize

    212KB

  • memory/3552-223-0x0000000002CC0000-0x0000000002D06000-memory.dmp

    Filesize

    280KB

  • memory/3552-225-0x0000000007340000-0x0000000007350000-memory.dmp

    Filesize

    64KB

  • memory/3552-227-0x0000000007340000-0x0000000007350000-memory.dmp

    Filesize

    64KB

  • memory/3552-229-0x0000000007340000-0x0000000007350000-memory.dmp

    Filesize

    64KB

  • memory/3552-978-0x000000000A1E0000-0x000000000A7E6000-memory.dmp

    Filesize

    6.0MB

  • memory/3552-979-0x0000000009BE0000-0x0000000009BF2000-memory.dmp

    Filesize

    72KB

  • memory/3552-980-0x0000000009C10000-0x0000000009D1A000-memory.dmp

    Filesize

    1.0MB

  • memory/3552-981-0x0000000009D30000-0x0000000009D6E000-memory.dmp

    Filesize

    248KB

  • memory/3552-982-0x0000000009EB0000-0x0000000009EFB000-memory.dmp

    Filesize

    300KB

  • memory/3552-983-0x0000000007340000-0x0000000007350000-memory.dmp

    Filesize

    64KB

  • memory/3552-984-0x000000000A040000-0x000000000A0A6000-memory.dmp

    Filesize

    408KB

  • memory/3552-985-0x000000000AD30000-0x000000000ADC2000-memory.dmp

    Filesize

    584KB

  • memory/3552-986-0x000000000AED0000-0x000000000AF20000-memory.dmp

    Filesize

    320KB

  • memory/3552-987-0x000000000AF20000-0x000000000AF96000-memory.dmp

    Filesize

    472KB

  • memory/3552-988-0x000000000AFC0000-0x000000000AFDE000-memory.dmp

    Filesize

    120KB

  • memory/3552-989-0x000000000B080000-0x000000000B242000-memory.dmp

    Filesize

    1.8MB

  • memory/3552-990-0x000000000B260000-0x000000000B78C000-memory.dmp

    Filesize

    5.2MB

  • memory/3980-997-0x0000000000030000-0x0000000000058000-memory.dmp

    Filesize

    160KB

  • memory/3980-998-0x0000000006DB0000-0x0000000006DFB000-memory.dmp

    Filesize

    300KB

  • memory/3980-999-0x0000000007090000-0x00000000070A0000-memory.dmp

    Filesize

    64KB