Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2023, 15:33
Static task
static1
General
-
Target
b80efe78c764b4a3229e08b9aa39c211a1cbe0bba811a7273f4e0483df6f038a.exe
-
Size
693KB
-
MD5
99f7d0f17c893682c6ae54f3c4b9bd44
-
SHA1
26ce329be648d6e24fc556c0655c3f9e1a468e9c
-
SHA256
b80efe78c764b4a3229e08b9aa39c211a1cbe0bba811a7273f4e0483df6f038a
-
SHA512
b32078e0cbff78101620cf6b3f633409474b0be77bde5a37da5388281ecdb7c50182e7870d4912d5ceac517a36756d97aabfcf91e872081ca8ecd4c3990a04be
-
SSDEEP
12288:3y90i9nge53vwSXxiJyCjhq8AMaQufNr87BPF3DFJ9Nj0ttQ/lYEDCWeYpqffCoZ:3ytgKNXxCjhqyDEZ87BPlYAl7Vb2qoZb
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 18634415.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 18634415.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 18634415.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 18634415.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 18634415.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 18634415.exe -
Executes dropped EXE 4 IoCs
pid Process 1180 un501813.exe 3332 18634415.exe 560 rk518042.exe 2324 si382265.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 18634415.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 18634415.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un501813.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un501813.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b80efe78c764b4a3229e08b9aa39c211a1cbe0bba811a7273f4e0483df6f038a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b80efe78c764b4a3229e08b9aa39c211a1cbe0bba811a7273f4e0483df6f038a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4652 3332 WerFault.exe 85 2212 560 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3332 18634415.exe 3332 18634415.exe 560 rk518042.exe 560 rk518042.exe 2324 si382265.exe 2324 si382265.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3332 18634415.exe Token: SeDebugPrivilege 560 rk518042.exe Token: SeDebugPrivilege 2324 si382265.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4348 wrote to memory of 1180 4348 b80efe78c764b4a3229e08b9aa39c211a1cbe0bba811a7273f4e0483df6f038a.exe 84 PID 4348 wrote to memory of 1180 4348 b80efe78c764b4a3229e08b9aa39c211a1cbe0bba811a7273f4e0483df6f038a.exe 84 PID 4348 wrote to memory of 1180 4348 b80efe78c764b4a3229e08b9aa39c211a1cbe0bba811a7273f4e0483df6f038a.exe 84 PID 1180 wrote to memory of 3332 1180 un501813.exe 85 PID 1180 wrote to memory of 3332 1180 un501813.exe 85 PID 1180 wrote to memory of 3332 1180 un501813.exe 85 PID 1180 wrote to memory of 560 1180 un501813.exe 91 PID 1180 wrote to memory of 560 1180 un501813.exe 91 PID 1180 wrote to memory of 560 1180 un501813.exe 91 PID 4348 wrote to memory of 2324 4348 b80efe78c764b4a3229e08b9aa39c211a1cbe0bba811a7273f4e0483df6f038a.exe 94 PID 4348 wrote to memory of 2324 4348 b80efe78c764b4a3229e08b9aa39c211a1cbe0bba811a7273f4e0483df6f038a.exe 94 PID 4348 wrote to memory of 2324 4348 b80efe78c764b4a3229e08b9aa39c211a1cbe0bba811a7273f4e0483df6f038a.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\b80efe78c764b4a3229e08b9aa39c211a1cbe0bba811a7273f4e0483df6f038a.exe"C:\Users\Admin\AppData\Local\Temp\b80efe78c764b4a3229e08b9aa39c211a1cbe0bba811a7273f4e0483df6f038a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un501813.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un501813.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\18634415.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\18634415.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 10804⤵
- Program crash
PID:4652
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk518042.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk518042.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 560 -s 18124⤵
- Program crash
PID:2212
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si382265.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si382265.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3332 -ip 33321⤵PID:4560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 560 -ip 5601⤵PID:2072
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
540KB
MD593025ab8cdcf055a3dab69aa4e690f8f
SHA156fda78e40acccbe60e43e238926488a90192ae6
SHA2563cb1d1dacc7a6d68d5466eb2e2c55b45368cf8f6fa75fbd278a83f7119afb56f
SHA5123456c58ff4b86e76625f09242e554efb06abafe26fa15a76b7a93f315bb898370084878121d01fa7fb0138ba02e9c6e25328f1acfafe322413c7d5afe20a7882
-
Filesize
540KB
MD593025ab8cdcf055a3dab69aa4e690f8f
SHA156fda78e40acccbe60e43e238926488a90192ae6
SHA2563cb1d1dacc7a6d68d5466eb2e2c55b45368cf8f6fa75fbd278a83f7119afb56f
SHA5123456c58ff4b86e76625f09242e554efb06abafe26fa15a76b7a93f315bb898370084878121d01fa7fb0138ba02e9c6e25328f1acfafe322413c7d5afe20a7882
-
Filesize
258KB
MD54d8d3af1426d35f999aa723316de8586
SHA14ed68f7b04a9965d4fdb53283d2106e25b8f66e6
SHA25615ce07d60af35d4a62628e41a9838230e56e92944bc7146b88b431ed1712e59b
SHA512c174899445c59011bd8342ca30557db51fdb425e85a6971c90f070ef06003b9b8d0bf21136b360846ea6e4fe2726b9bc564440af58bfd8d4a1cd871f8ab62949
-
Filesize
258KB
MD54d8d3af1426d35f999aa723316de8586
SHA14ed68f7b04a9965d4fdb53283d2106e25b8f66e6
SHA25615ce07d60af35d4a62628e41a9838230e56e92944bc7146b88b431ed1712e59b
SHA512c174899445c59011bd8342ca30557db51fdb425e85a6971c90f070ef06003b9b8d0bf21136b360846ea6e4fe2726b9bc564440af58bfd8d4a1cd871f8ab62949
-
Filesize
340KB
MD566277de1d87c3d41027be18f44725f0a
SHA1d429fcafa099500d753a3c4ce0717ab5b04979d3
SHA256ddb25aca080ea3834c30235a84653f17e71000ee21122145ad11d466d062c557
SHA5125089296979a0b6be77d9379424cd280e59ab5c0fd7c65feafa66724fa9632fa7917dda38d98b31f92750a64474fdde8a2cfdc3fb1aaf067e5b34e5f6733a3e28
-
Filesize
340KB
MD566277de1d87c3d41027be18f44725f0a
SHA1d429fcafa099500d753a3c4ce0717ab5b04979d3
SHA256ddb25aca080ea3834c30235a84653f17e71000ee21122145ad11d466d062c557
SHA5125089296979a0b6be77d9379424cd280e59ab5c0fd7c65feafa66724fa9632fa7917dda38d98b31f92750a64474fdde8a2cfdc3fb1aaf067e5b34e5f6733a3e28