Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
73s -
max time network
75s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
25/04/2023, 17:34 UTC
Static task
static1
General
-
Target
cb79e60802186266f1573229f3a25ef6b4087267a2d130897e8413bb590fa4e0.exe
-
Size
695KB
-
MD5
a18d285b8e1fedd91d2d85870393fe61
-
SHA1
6b73d51c2e5c8fa7991150f90e24080c2dc90d5a
-
SHA256
cb79e60802186266f1573229f3a25ef6b4087267a2d130897e8413bb590fa4e0
-
SHA512
3fa2940bada3955cacb10ac3911bab3f616436fe3c2e47d1051cae7f90a769a7a49c704bfb1081191de888e4adefe8b5913c6ef4f9bd4d3f15ef98589adfda93
-
SSDEEP
12288:Ey90SE/2Kj4N159W8i89TpYeO8gl0k118D65VNj7W/evln4b2TFL:Eydikuo1Q8gl0ZKNj7W2vB4qTFL
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 41950131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 41950131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 41950131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 41950131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 41950131.exe -
Executes dropped EXE 4 IoCs
pid Process 2872 un165510.exe 3364 41950131.exe 4120 rk613160.exe 1708 si836015.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 41950131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 41950131.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cb79e60802186266f1573229f3a25ef6b4087267a2d130897e8413bb590fa4e0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cb79e60802186266f1573229f3a25ef6b4087267a2d130897e8413bb590fa4e0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un165510.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un165510.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3364 41950131.exe 3364 41950131.exe 4120 rk613160.exe 4120 rk613160.exe 1708 si836015.exe 1708 si836015.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3364 41950131.exe Token: SeDebugPrivilege 4120 rk613160.exe Token: SeDebugPrivilege 1708 si836015.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2872 2444 cb79e60802186266f1573229f3a25ef6b4087267a2d130897e8413bb590fa4e0.exe 66 PID 2444 wrote to memory of 2872 2444 cb79e60802186266f1573229f3a25ef6b4087267a2d130897e8413bb590fa4e0.exe 66 PID 2444 wrote to memory of 2872 2444 cb79e60802186266f1573229f3a25ef6b4087267a2d130897e8413bb590fa4e0.exe 66 PID 2872 wrote to memory of 3364 2872 un165510.exe 67 PID 2872 wrote to memory of 3364 2872 un165510.exe 67 PID 2872 wrote to memory of 3364 2872 un165510.exe 67 PID 2872 wrote to memory of 4120 2872 un165510.exe 68 PID 2872 wrote to memory of 4120 2872 un165510.exe 68 PID 2872 wrote to memory of 4120 2872 un165510.exe 68 PID 2444 wrote to memory of 1708 2444 cb79e60802186266f1573229f3a25ef6b4087267a2d130897e8413bb590fa4e0.exe 70 PID 2444 wrote to memory of 1708 2444 cb79e60802186266f1573229f3a25ef6b4087267a2d130897e8413bb590fa4e0.exe 70 PID 2444 wrote to memory of 1708 2444 cb79e60802186266f1573229f3a25ef6b4087267a2d130897e8413bb590fa4e0.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb79e60802186266f1573229f3a25ef6b4087267a2d130897e8413bb590fa4e0.exe"C:\Users\Admin\AppData\Local\Temp\cb79e60802186266f1573229f3a25ef6b4087267a2d130897e8413bb590fa4e0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165510.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165510.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\41950131.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\41950131.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3364
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613160.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613160.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4120
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si836015.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si836015.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
Network
-
Remote address:8.8.8.8:53Request143.248.161.185.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.77.109.52.in-addr.arpaIN PTRResponse
-
156 B 120 B 3 3
-
156 B 120 B 3 3
-
156 B 120 B 3 3
-
322 B 7
-
156 B 120 B 3 3
-
156 B 120 B 3 3
-
156 B 120 B 3 3
-
156 B 120 B 3 3
-
156 B 120 B 3 3
-
156 B 120 B 3 3
-
156 B 120 B 3 3
-
5.2kB 7.7kB 15 13
-
322 B 7
-
156 B 120 B 3 3
-
156 B 120 B 3 3
-
156 B 120 B 3 3
-
156 B 120 B 3 3
-
156 B 120 B 3 3
-
156 B 120 B 3 3
-
156 B 120 B 3 3
-
156 B 120 B 3 3
-
156 B 120 B 3 3
-
156 B 120 B 3 3
-
156 B 120 B 3 3
-
156 B 120 B 3 3
-
156 B 120 B 3 3
-
5.1kB 7.8kB 16 14
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
541KB
MD5afc4ab305bcbee75074a3f77bc488e40
SHA197a7713ae499fdcd77329b3c1a3b7ce4c96e513e
SHA256059d94396d1ca59f970fcf200fc1fec6378ee3d94a0fb0b3fe08e37efa1d7ea9
SHA51282c262f8364fe97824eef9c7bf554a57b3bb210fd279fd4edaf2ab61f1f92cfa10742e1288f7187163b7ff5272a525c6c9c4cdb8ae3b3b1396a8006bf2685be6
-
Filesize
541KB
MD5afc4ab305bcbee75074a3f77bc488e40
SHA197a7713ae499fdcd77329b3c1a3b7ce4c96e513e
SHA256059d94396d1ca59f970fcf200fc1fec6378ee3d94a0fb0b3fe08e37efa1d7ea9
SHA51282c262f8364fe97824eef9c7bf554a57b3bb210fd279fd4edaf2ab61f1f92cfa10742e1288f7187163b7ff5272a525c6c9c4cdb8ae3b3b1396a8006bf2685be6
-
Filesize
258KB
MD5b07d55e76e5c5fa5e156b9797a14ce6d
SHA1dc88f3b9c1091211958a7df72539c2d26e2e41fc
SHA256cd29a12b470dc394b1d2fcefea9d6652948c1d83eb48e29830633d039998a1f2
SHA512efa6087e7e6ef5e17a49736fc672ee30b7aa5d2bf54827f8251f341c2a5caf6cdfa3eaaf83ecfe943662ac8c0065ba911f2d329314653c340c4d5f502ed2948e
-
Filesize
258KB
MD5b07d55e76e5c5fa5e156b9797a14ce6d
SHA1dc88f3b9c1091211958a7df72539c2d26e2e41fc
SHA256cd29a12b470dc394b1d2fcefea9d6652948c1d83eb48e29830633d039998a1f2
SHA512efa6087e7e6ef5e17a49736fc672ee30b7aa5d2bf54827f8251f341c2a5caf6cdfa3eaaf83ecfe943662ac8c0065ba911f2d329314653c340c4d5f502ed2948e
-
Filesize
341KB
MD5cfb9116bd5ae93f81e4784f874b985d3
SHA13fcd4a140b3b4d3e92b94d37a4c8995796a3bafc
SHA256f30f26ab0ba5c5bee4cb2e2c122a9abe7fab6e6b4ff1d6f7c988acddae1ac640
SHA512a5447ff06320403e5f807c06496ecd5898d5b5b370b4094a5ddc7420ceafbf3575ea3f84aa05beb2a83c94df0d60894a8c4a200129f18307a2b42fc9c254362b
-
Filesize
341KB
MD5cfb9116bd5ae93f81e4784f874b985d3
SHA13fcd4a140b3b4d3e92b94d37a4c8995796a3bafc
SHA256f30f26ab0ba5c5bee4cb2e2c122a9abe7fab6e6b4ff1d6f7c988acddae1ac640
SHA512a5447ff06320403e5f807c06496ecd5898d5b5b370b4094a5ddc7420ceafbf3575ea3f84aa05beb2a83c94df0d60894a8c4a200129f18307a2b42fc9c254362b