Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    73s
  • max time network
    75s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25/04/2023, 17:34 UTC

General

  • Target

    cb79e60802186266f1573229f3a25ef6b4087267a2d130897e8413bb590fa4e0.exe

  • Size

    695KB

  • MD5

    a18d285b8e1fedd91d2d85870393fe61

  • SHA1

    6b73d51c2e5c8fa7991150f90e24080c2dc90d5a

  • SHA256

    cb79e60802186266f1573229f3a25ef6b4087267a2d130897e8413bb590fa4e0

  • SHA512

    3fa2940bada3955cacb10ac3911bab3f616436fe3c2e47d1051cae7f90a769a7a49c704bfb1081191de888e4adefe8b5913c6ef4f9bd4d3f15ef98589adfda93

  • SSDEEP

    12288:Ey90SE/2Kj4N159W8i89TpYeO8gl0k118D65VNj7W/evln4b2TFL:Eydikuo1Q8gl0ZKNj7W2vB4qTFL

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb79e60802186266f1573229f3a25ef6b4087267a2d130897e8413bb590fa4e0.exe
    "C:\Users\Admin\AppData\Local\Temp\cb79e60802186266f1573229f3a25ef6b4087267a2d130897e8413bb590fa4e0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165510.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165510.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\41950131.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\41950131.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3364
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613160.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613160.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4120
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si836015.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si836015.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1708

Network

  • flag-us
    DNS
    143.248.161.185.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    143.248.161.185.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    0.77.109.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    0.77.109.52.in-addr.arpa
    IN PTR
    Response
  • 185.161.248.143:38452
    rk613160.exe
    156 B
    120 B
    3
    3
  • 185.161.248.143:38452
    rk613160.exe
    156 B
    120 B
    3
    3
  • 185.161.248.143:38452
    rk613160.exe
    156 B
    120 B
    3
    3
  • 51.132.193.104:443
    322 B
    7
  • 185.161.248.143:38452
    rk613160.exe
    156 B
    120 B
    3
    3
  • 185.161.248.143:38452
    rk613160.exe
    156 B
    120 B
    3
    3
  • 185.161.248.143:38452
    rk613160.exe
    156 B
    120 B
    3
    3
  • 185.161.248.143:38452
    rk613160.exe
    156 B
    120 B
    3
    3
  • 185.161.248.143:38452
    rk613160.exe
    156 B
    120 B
    3
    3
  • 185.161.248.143:38452
    rk613160.exe
    156 B
    120 B
    3
    3
  • 185.161.248.143:38452
    rk613160.exe
    156 B
    120 B
    3
    3
  • 185.161.248.143:38452
    rk613160.exe
    5.2kB
    7.7kB
    15
    13
  • 13.107.4.50:80
    322 B
    7
  • 185.161.248.143:38452
    si836015.exe
    156 B
    120 B
    3
    3
  • 185.161.248.143:38452
    si836015.exe
    156 B
    120 B
    3
    3
  • 185.161.248.143:38452
    si836015.exe
    156 B
    120 B
    3
    3
  • 185.161.248.143:38452
    si836015.exe
    156 B
    120 B
    3
    3
  • 185.161.248.143:38452
    si836015.exe
    156 B
    120 B
    3
    3
  • 185.161.248.143:38452
    si836015.exe
    156 B
    120 B
    3
    3
  • 185.161.248.143:38452
    si836015.exe
    156 B
    120 B
    3
    3
  • 185.161.248.143:38452
    si836015.exe
    156 B
    120 B
    3
    3
  • 185.161.248.143:38452
    si836015.exe
    156 B
    120 B
    3
    3
  • 185.161.248.143:38452
    si836015.exe
    156 B
    120 B
    3
    3
  • 185.161.248.143:38452
    si836015.exe
    156 B
    120 B
    3
    3
  • 185.161.248.143:38452
    si836015.exe
    156 B
    120 B
    3
    3
  • 185.161.248.143:38452
    si836015.exe
    156 B
    120 B
    3
    3
  • 185.161.248.143:38452
    si836015.exe
    5.1kB
    7.8kB
    16
    14
  • 8.8.8.8:53
    143.248.161.185.in-addr.arpa
    dns
    74 B
    134 B
    1
    1

    DNS Request

    143.248.161.185.in-addr.arpa

  • 8.8.8.8:53
    0.77.109.52.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    0.77.109.52.in-addr.arpa

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si836015.exe

    Filesize

    136KB

    MD5

    73cae2858379cab7e68b9e5bf751c372

    SHA1

    38c375354bda6e5c8fb2579f1ef0416a6c65929a

    SHA256

    e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

    SHA512

    343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si836015.exe

    Filesize

    136KB

    MD5

    73cae2858379cab7e68b9e5bf751c372

    SHA1

    38c375354bda6e5c8fb2579f1ef0416a6c65929a

    SHA256

    e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c

    SHA512

    343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165510.exe

    Filesize

    541KB

    MD5

    afc4ab305bcbee75074a3f77bc488e40

    SHA1

    97a7713ae499fdcd77329b3c1a3b7ce4c96e513e

    SHA256

    059d94396d1ca59f970fcf200fc1fec6378ee3d94a0fb0b3fe08e37efa1d7ea9

    SHA512

    82c262f8364fe97824eef9c7bf554a57b3bb210fd279fd4edaf2ab61f1f92cfa10742e1288f7187163b7ff5272a525c6c9c4cdb8ae3b3b1396a8006bf2685be6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165510.exe

    Filesize

    541KB

    MD5

    afc4ab305bcbee75074a3f77bc488e40

    SHA1

    97a7713ae499fdcd77329b3c1a3b7ce4c96e513e

    SHA256

    059d94396d1ca59f970fcf200fc1fec6378ee3d94a0fb0b3fe08e37efa1d7ea9

    SHA512

    82c262f8364fe97824eef9c7bf554a57b3bb210fd279fd4edaf2ab61f1f92cfa10742e1288f7187163b7ff5272a525c6c9c4cdb8ae3b3b1396a8006bf2685be6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\41950131.exe

    Filesize

    258KB

    MD5

    b07d55e76e5c5fa5e156b9797a14ce6d

    SHA1

    dc88f3b9c1091211958a7df72539c2d26e2e41fc

    SHA256

    cd29a12b470dc394b1d2fcefea9d6652948c1d83eb48e29830633d039998a1f2

    SHA512

    efa6087e7e6ef5e17a49736fc672ee30b7aa5d2bf54827f8251f341c2a5caf6cdfa3eaaf83ecfe943662ac8c0065ba911f2d329314653c340c4d5f502ed2948e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\41950131.exe

    Filesize

    258KB

    MD5

    b07d55e76e5c5fa5e156b9797a14ce6d

    SHA1

    dc88f3b9c1091211958a7df72539c2d26e2e41fc

    SHA256

    cd29a12b470dc394b1d2fcefea9d6652948c1d83eb48e29830633d039998a1f2

    SHA512

    efa6087e7e6ef5e17a49736fc672ee30b7aa5d2bf54827f8251f341c2a5caf6cdfa3eaaf83ecfe943662ac8c0065ba911f2d329314653c340c4d5f502ed2948e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613160.exe

    Filesize

    341KB

    MD5

    cfb9116bd5ae93f81e4784f874b985d3

    SHA1

    3fcd4a140b3b4d3e92b94d37a4c8995796a3bafc

    SHA256

    f30f26ab0ba5c5bee4cb2e2c122a9abe7fab6e6b4ff1d6f7c988acddae1ac640

    SHA512

    a5447ff06320403e5f807c06496ecd5898d5b5b370b4094a5ddc7420ceafbf3575ea3f84aa05beb2a83c94df0d60894a8c4a200129f18307a2b42fc9c254362b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613160.exe

    Filesize

    341KB

    MD5

    cfb9116bd5ae93f81e4784f874b985d3

    SHA1

    3fcd4a140b3b4d3e92b94d37a4c8995796a3bafc

    SHA256

    f30f26ab0ba5c5bee4cb2e2c122a9abe7fab6e6b4ff1d6f7c988acddae1ac640

    SHA512

    a5447ff06320403e5f807c06496ecd5898d5b5b370b4094a5ddc7420ceafbf3575ea3f84aa05beb2a83c94df0d60894a8c4a200129f18307a2b42fc9c254362b

  • memory/1708-1002-0x0000000000420000-0x0000000000448000-memory.dmp

    Filesize

    160KB

  • memory/1708-1003-0x00000000071A0000-0x00000000071EB000-memory.dmp

    Filesize

    300KB

  • memory/1708-1004-0x0000000002820000-0x0000000002830000-memory.dmp

    Filesize

    64KB

  • memory/1708-1005-0x0000000002820000-0x0000000002830000-memory.dmp

    Filesize

    64KB

  • memory/3364-146-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/3364-160-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/3364-142-0x00000000048C0000-0x00000000048D0000-memory.dmp

    Filesize

    64KB

  • memory/3364-139-0x00000000048C0000-0x00000000048D0000-memory.dmp

    Filesize

    64KB

  • memory/3364-143-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/3364-144-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/3364-140-0x0000000004960000-0x0000000004978000-memory.dmp

    Filesize

    96KB

  • memory/3364-148-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/3364-150-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/3364-152-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/3364-154-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/3364-156-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/3364-158-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/3364-141-0x00000000048C0000-0x00000000048D0000-memory.dmp

    Filesize

    64KB

  • memory/3364-162-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/3364-164-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/3364-166-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/3364-168-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/3364-170-0x0000000004960000-0x0000000004973000-memory.dmp

    Filesize

    76KB

  • memory/3364-171-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/3364-172-0x00000000048C0000-0x00000000048D0000-memory.dmp

    Filesize

    64KB

  • memory/3364-174-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/3364-138-0x0000000007330000-0x000000000782E000-memory.dmp

    Filesize

    5.0MB

  • memory/3364-137-0x00000000048A0000-0x00000000048BA000-memory.dmp

    Filesize

    104KB

  • memory/3364-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4120-183-0x00000000073A0000-0x00000000073B0000-memory.dmp

    Filesize

    64KB

  • memory/4120-977-0x0000000009C30000-0x000000000A236000-memory.dmp

    Filesize

    6.0MB

  • memory/4120-184-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4120-186-0x00000000073A0000-0x00000000073B0000-memory.dmp

    Filesize

    64KB

  • memory/4120-185-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4120-188-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4120-190-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4120-192-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4120-194-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4120-196-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4120-198-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4120-200-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4120-202-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4120-204-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4120-206-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4120-208-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4120-210-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4120-212-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4120-214-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4120-216-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4120-218-0x0000000004B00000-0x0000000004B35000-memory.dmp

    Filesize

    212KB

  • memory/4120-182-0x00000000073A0000-0x00000000073B0000-memory.dmp

    Filesize

    64KB

  • memory/4120-978-0x0000000004E00000-0x0000000004E12000-memory.dmp

    Filesize

    72KB

  • memory/4120-979-0x000000000A240000-0x000000000A34A000-memory.dmp

    Filesize

    1.0MB

  • memory/4120-980-0x000000000A350000-0x000000000A38E000-memory.dmp

    Filesize

    248KB

  • memory/4120-982-0x00000000073A0000-0x00000000073B0000-memory.dmp

    Filesize

    64KB

  • memory/4120-981-0x000000000A4C0000-0x000000000A50B000-memory.dmp

    Filesize

    300KB

  • memory/4120-984-0x00000000073A0000-0x00000000073B0000-memory.dmp

    Filesize

    64KB

  • memory/4120-985-0x00000000073A0000-0x00000000073B0000-memory.dmp

    Filesize

    64KB

  • memory/4120-986-0x00000000073A0000-0x00000000073B0000-memory.dmp

    Filesize

    64KB

  • memory/4120-987-0x00000000073A0000-0x00000000073B0000-memory.dmp

    Filesize

    64KB

  • memory/4120-989-0x00000000072C0000-0x0000000007326000-memory.dmp

    Filesize

    408KB

  • memory/4120-990-0x000000000AB90000-0x000000000AC22000-memory.dmp

    Filesize

    584KB

  • memory/4120-991-0x000000000ADA0000-0x000000000AE16000-memory.dmp

    Filesize

    472KB

  • memory/4120-992-0x000000000AE40000-0x000000000AE5E000-memory.dmp

    Filesize

    120KB

  • memory/4120-181-0x0000000002C80000-0x0000000002CC6000-memory.dmp

    Filesize

    280KB

  • memory/4120-180-0x0000000004B00000-0x0000000004B3A000-memory.dmp

    Filesize

    232KB

  • memory/4120-179-0x0000000002F80000-0x0000000002FBC000-memory.dmp

    Filesize

    240KB

  • memory/4120-993-0x000000000AEE0000-0x000000000AF30000-memory.dmp

    Filesize

    320KB

  • memory/4120-995-0x000000000AF30000-0x000000000B0F2000-memory.dmp

    Filesize

    1.8MB

  • memory/4120-996-0x000000000B110000-0x000000000B63C000-memory.dmp

    Filesize

    5.2MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.