Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2023, 18:03
Static task
static1
General
-
Target
915d59dcbe17aa53566572a8214c24c00940a284225a710c76e775a0ec9d30fb.exe
-
Size
695KB
-
MD5
15f6631e6ecad2b4c0c77640f1259d8d
-
SHA1
e5c1b81d675e170a609407f70dfe069d1922394a
-
SHA256
915d59dcbe17aa53566572a8214c24c00940a284225a710c76e775a0ec9d30fb
-
SHA512
51db485c7e3324fac552989c3d936953af75c316b0628239a7fd3e92198a38dcbfa93afaf4b97272fc634791dee7c1aea248e67524ec9be9759908d60f977a0f
-
SSDEEP
12288:2y90VAHIaEd+rryjhkfJrszjTTT4erehqlniMVdUN0cRtbP1LBeSimdFf:2y9HqMrryjGavTTZqhqlPdUe4bVimdFf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 43535733.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 43535733.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 43535733.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 43535733.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 43535733.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 43535733.exe -
Executes dropped EXE 4 IoCs
pid Process 428 un421300.exe 2436 43535733.exe 2392 rk959172.exe 3580 si426174.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 43535733.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 43535733.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 915d59dcbe17aa53566572a8214c24c00940a284225a710c76e775a0ec9d30fb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 915d59dcbe17aa53566572a8214c24c00940a284225a710c76e775a0ec9d30fb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un421300.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un421300.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 216 2436 WerFault.exe 83 1428 2392 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2436 43535733.exe 2436 43535733.exe 2392 rk959172.exe 2392 rk959172.exe 3580 si426174.exe 3580 si426174.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2436 43535733.exe Token: SeDebugPrivilege 2392 rk959172.exe Token: SeDebugPrivilege 3580 si426174.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1860 wrote to memory of 428 1860 915d59dcbe17aa53566572a8214c24c00940a284225a710c76e775a0ec9d30fb.exe 82 PID 1860 wrote to memory of 428 1860 915d59dcbe17aa53566572a8214c24c00940a284225a710c76e775a0ec9d30fb.exe 82 PID 1860 wrote to memory of 428 1860 915d59dcbe17aa53566572a8214c24c00940a284225a710c76e775a0ec9d30fb.exe 82 PID 428 wrote to memory of 2436 428 un421300.exe 83 PID 428 wrote to memory of 2436 428 un421300.exe 83 PID 428 wrote to memory of 2436 428 un421300.exe 83 PID 428 wrote to memory of 2392 428 un421300.exe 86 PID 428 wrote to memory of 2392 428 un421300.exe 86 PID 428 wrote to memory of 2392 428 un421300.exe 86 PID 1860 wrote to memory of 3580 1860 915d59dcbe17aa53566572a8214c24c00940a284225a710c76e775a0ec9d30fb.exe 90 PID 1860 wrote to memory of 3580 1860 915d59dcbe17aa53566572a8214c24c00940a284225a710c76e775a0ec9d30fb.exe 90 PID 1860 wrote to memory of 3580 1860 915d59dcbe17aa53566572a8214c24c00940a284225a710c76e775a0ec9d30fb.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\915d59dcbe17aa53566572a8214c24c00940a284225a710c76e775a0ec9d30fb.exe"C:\Users\Admin\AppData\Local\Temp\915d59dcbe17aa53566572a8214c24c00940a284225a710c76e775a0ec9d30fb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un421300.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un421300.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\43535733.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\43535733.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 10844⤵
- Program crash
PID:216
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk959172.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk959172.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 20284⤵
- Program crash
PID:1428
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si426174.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si426174.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2436 -ip 24361⤵PID:4544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2392 -ip 23921⤵PID:1160
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
541KB
MD553298888bcbe17b7b17ec8cd4477517b
SHA1e9dd762f5f4e13d63111123d6a9c3c50acd2d20d
SHA256e898a647ed168009123c41b79e4bd31cacc5ac57fac398a69b07e2f8eaa7b464
SHA51207b9021e70e73e571bfc3c1d6c41c8054f8b0c126ea8a6d62647e57be270c99de905f426ef34708a5ebee96bdcb2897197dc091ca90dc9406a5133c58015f396
-
Filesize
541KB
MD553298888bcbe17b7b17ec8cd4477517b
SHA1e9dd762f5f4e13d63111123d6a9c3c50acd2d20d
SHA256e898a647ed168009123c41b79e4bd31cacc5ac57fac398a69b07e2f8eaa7b464
SHA51207b9021e70e73e571bfc3c1d6c41c8054f8b0c126ea8a6d62647e57be270c99de905f426ef34708a5ebee96bdcb2897197dc091ca90dc9406a5133c58015f396
-
Filesize
258KB
MD5e702bff2cd30ffde04089195f1f87568
SHA1bcbcd124a417d6785646ffcc1252d580a80a6209
SHA256111667b0f38e30f4366d4ed491f9d91acb912aa67b27c26ca833e8e5ce982c2b
SHA512133abd774d153f1c194563dfd9e9ec611a625861de94e5fea518959c4f93de880cd9723c1aaf23262cde812039c6081289c4495e4397d96974472a2427c88456
-
Filesize
258KB
MD5e702bff2cd30ffde04089195f1f87568
SHA1bcbcd124a417d6785646ffcc1252d580a80a6209
SHA256111667b0f38e30f4366d4ed491f9d91acb912aa67b27c26ca833e8e5ce982c2b
SHA512133abd774d153f1c194563dfd9e9ec611a625861de94e5fea518959c4f93de880cd9723c1aaf23262cde812039c6081289c4495e4397d96974472a2427c88456
-
Filesize
341KB
MD502ac764d29fd3a65389056c40c75b9d9
SHA1ee311860923556fa34e8fb6aa9914de21580927e
SHA256334bc40a79c97cc54aac81dd5519115edf0c903f4425a592b74fa3436e83530e
SHA51264b4945118e8da6ad62fc9c83833f524d10315390bb882fa2b75a552b1e48b6aedd4d81e39d3015a23621f26cfef95ede5b5226f6978ea24382b3d3192abf274
-
Filesize
341KB
MD502ac764d29fd3a65389056c40c75b9d9
SHA1ee311860923556fa34e8fb6aa9914de21580927e
SHA256334bc40a79c97cc54aac81dd5519115edf0c903f4425a592b74fa3436e83530e
SHA51264b4945118e8da6ad62fc9c83833f524d10315390bb882fa2b75a552b1e48b6aedd4d81e39d3015a23621f26cfef95ede5b5226f6978ea24382b3d3192abf274