Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
54s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
25/04/2023, 15:43
Static task
static1
General
-
Target
6826552d36ab070a5884983592e8631ac539e10f4afd83958f828e9dac553df1.exe
-
Size
694KB
-
MD5
c110e6a3af5903b1bab09d5232992ae9
-
SHA1
7592231f3180394f68d62f4da811918dba15ae89
-
SHA256
6826552d36ab070a5884983592e8631ac539e10f4afd83958f828e9dac553df1
-
SHA512
86ba11fa835150e3ec37a87eb410f0bb6cf158d47a057a6a71c95e794b21dcfaaf83c1a17858380222a2045d3ff987cd43959e36644bbd7f607c5f50fe552a20
-
SSDEEP
12288:Qy90aya3wDcqD38jvwfIjYCNr8NoMyhlOEwi6WDvolJUNt0ttOTzYEF1WJbE9X:QyvAAqD3LijZ8NYlh6WDGSz98lEB
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 92386976.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 92386976.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 92386976.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 92386976.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 92386976.exe -
Executes dropped EXE 4 IoCs
pid Process 3600 un468387.exe 2496 92386976.exe 3552 rk956594.exe 3980 si980348.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 92386976.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 92386976.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6826552d36ab070a5884983592e8631ac539e10f4afd83958f828e9dac553df1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6826552d36ab070a5884983592e8631ac539e10f4afd83958f828e9dac553df1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un468387.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un468387.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2496 92386976.exe 2496 92386976.exe 3552 rk956594.exe 3552 rk956594.exe 3980 si980348.exe 3980 si980348.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2496 92386976.exe Token: SeDebugPrivilege 3552 rk956594.exe Token: SeDebugPrivilege 3980 si980348.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4204 wrote to memory of 3600 4204 6826552d36ab070a5884983592e8631ac539e10f4afd83958f828e9dac553df1.exe 66 PID 4204 wrote to memory of 3600 4204 6826552d36ab070a5884983592e8631ac539e10f4afd83958f828e9dac553df1.exe 66 PID 4204 wrote to memory of 3600 4204 6826552d36ab070a5884983592e8631ac539e10f4afd83958f828e9dac553df1.exe 66 PID 3600 wrote to memory of 2496 3600 un468387.exe 67 PID 3600 wrote to memory of 2496 3600 un468387.exe 67 PID 3600 wrote to memory of 2496 3600 un468387.exe 67 PID 3600 wrote to memory of 3552 3600 un468387.exe 68 PID 3600 wrote to memory of 3552 3600 un468387.exe 68 PID 3600 wrote to memory of 3552 3600 un468387.exe 68 PID 4204 wrote to memory of 3980 4204 6826552d36ab070a5884983592e8631ac539e10f4afd83958f828e9dac553df1.exe 70 PID 4204 wrote to memory of 3980 4204 6826552d36ab070a5884983592e8631ac539e10f4afd83958f828e9dac553df1.exe 70 PID 4204 wrote to memory of 3980 4204 6826552d36ab070a5884983592e8631ac539e10f4afd83958f828e9dac553df1.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\6826552d36ab070a5884983592e8631ac539e10f4afd83958f828e9dac553df1.exe"C:\Users\Admin\AppData\Local\Temp\6826552d36ab070a5884983592e8631ac539e10f4afd83958f828e9dac553df1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un468387.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un468387.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\92386976.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\92386976.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk956594.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk956594.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si980348.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si980348.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3980
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
540KB
MD5c7a9f5494a87724f26f57cdc5b007eb4
SHA15205961ad2f111b61a8f0855a415351a5cfc772c
SHA2565e4486e8ecd8c8442671d35c873dfbf1cb2fd5e5dcd485a3303abf6041e2569f
SHA512ba6c965d21a8e14ad83511599c1b9cb6e0c320f9552507af13bc35651a57132fa0da9bfd6d1ea4e9fb5c59d4fe44bf9bae04171e5869c950e20c020e7d1e67eb
-
Filesize
540KB
MD5c7a9f5494a87724f26f57cdc5b007eb4
SHA15205961ad2f111b61a8f0855a415351a5cfc772c
SHA2565e4486e8ecd8c8442671d35c873dfbf1cb2fd5e5dcd485a3303abf6041e2569f
SHA512ba6c965d21a8e14ad83511599c1b9cb6e0c320f9552507af13bc35651a57132fa0da9bfd6d1ea4e9fb5c59d4fe44bf9bae04171e5869c950e20c020e7d1e67eb
-
Filesize
258KB
MD53ac388b5d43ca3960ad4c4258af70f27
SHA196dbbcd539b8caac6fde6c48c09f2c9ebeab4bb4
SHA2566b3670b5d9e482bb6ed9c0450219ffc54d1c8d660ae7db12d08c004bf67f1ce9
SHA5121a5e8f1ece136495b1617febf72ad8cdcb46c5662827a6940b8d7ea2ca98254bbeb1e5e61ec66b3c6177db0d32a026c5d35f83b1b5dd5ca35f2f4e2d6f64b396
-
Filesize
258KB
MD53ac388b5d43ca3960ad4c4258af70f27
SHA196dbbcd539b8caac6fde6c48c09f2c9ebeab4bb4
SHA2566b3670b5d9e482bb6ed9c0450219ffc54d1c8d660ae7db12d08c004bf67f1ce9
SHA5121a5e8f1ece136495b1617febf72ad8cdcb46c5662827a6940b8d7ea2ca98254bbeb1e5e61ec66b3c6177db0d32a026c5d35f83b1b5dd5ca35f2f4e2d6f64b396
-
Filesize
340KB
MD584180cabdb9114ca95ad1a4bff3526a6
SHA14c31cc7eed6562bf6ed46cb5d134b7116b175452
SHA2568278b80e3cac92143f7711f28f5d1600d3e0e1ae79f7e0172beef51a740a2b87
SHA51229bca05ab3ba68dce60c847f88feb110f0baeae73d203a94a99ab86246b5e0a7b6487954976e5d727cf7ead640da23e10c525f031821622807f800f1efceb935
-
Filesize
340KB
MD584180cabdb9114ca95ad1a4bff3526a6
SHA14c31cc7eed6562bf6ed46cb5d134b7116b175452
SHA2568278b80e3cac92143f7711f28f5d1600d3e0e1ae79f7e0172beef51a740a2b87
SHA51229bca05ab3ba68dce60c847f88feb110f0baeae73d203a94a99ab86246b5e0a7b6487954976e5d727cf7ead640da23e10c525f031821622807f800f1efceb935