Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
60s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2023, 19:12
Static task
static1
General
-
Target
d8367777c05a8973d1ec20f2bf9c0d9908fbae476259209f93e90f7c0ea39e25.exe
-
Size
695KB
-
MD5
2fda2bbfa6c8b693d069b2acc099195c
-
SHA1
5ed21d32853c79a205001c52091a6ee62f8e8cf3
-
SHA256
d8367777c05a8973d1ec20f2bf9c0d9908fbae476259209f93e90f7c0ea39e25
-
SHA512
a927be850ad44834bf170df47252780f1cd43db92c4a3130af2e3932d600b0f48f257045829ac286ebc6f6aa70e5b8e4468fd0cfbe40082beb1d3073f05235eb
-
SSDEEP
12288:+y90pQ2ToWFVRL0L2NoFhMdzpw1HqlniLVdUN0cRgbPZiBQuyWNYGQ8hCg:+yGTo0Vd0kmhMdzGHqlCdUeXbuNOI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 03301619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 03301619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 03301619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 03301619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 03301619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 03301619.exe -
Executes dropped EXE 4 IoCs
pid Process 1528 un990471.exe 448 03301619.exe 3840 rk080542.exe 4992 si489419.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 03301619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 03301619.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d8367777c05a8973d1ec20f2bf9c0d9908fbae476259209f93e90f7c0ea39e25.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d8367777c05a8973d1ec20f2bf9c0d9908fbae476259209f93e90f7c0ea39e25.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un990471.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un990471.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1152 448 WerFault.exe 85 2184 3840 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 448 03301619.exe 448 03301619.exe 3840 rk080542.exe 3840 rk080542.exe 4992 si489419.exe 4992 si489419.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 448 03301619.exe Token: SeDebugPrivilege 3840 rk080542.exe Token: SeDebugPrivilege 4992 si489419.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4444 wrote to memory of 1528 4444 d8367777c05a8973d1ec20f2bf9c0d9908fbae476259209f93e90f7c0ea39e25.exe 84 PID 4444 wrote to memory of 1528 4444 d8367777c05a8973d1ec20f2bf9c0d9908fbae476259209f93e90f7c0ea39e25.exe 84 PID 4444 wrote to memory of 1528 4444 d8367777c05a8973d1ec20f2bf9c0d9908fbae476259209f93e90f7c0ea39e25.exe 84 PID 1528 wrote to memory of 448 1528 un990471.exe 85 PID 1528 wrote to memory of 448 1528 un990471.exe 85 PID 1528 wrote to memory of 448 1528 un990471.exe 85 PID 1528 wrote to memory of 3840 1528 un990471.exe 91 PID 1528 wrote to memory of 3840 1528 un990471.exe 91 PID 1528 wrote to memory of 3840 1528 un990471.exe 91 PID 4444 wrote to memory of 4992 4444 d8367777c05a8973d1ec20f2bf9c0d9908fbae476259209f93e90f7c0ea39e25.exe 94 PID 4444 wrote to memory of 4992 4444 d8367777c05a8973d1ec20f2bf9c0d9908fbae476259209f93e90f7c0ea39e25.exe 94 PID 4444 wrote to memory of 4992 4444 d8367777c05a8973d1ec20f2bf9c0d9908fbae476259209f93e90f7c0ea39e25.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8367777c05a8973d1ec20f2bf9c0d9908fbae476259209f93e90f7c0ea39e25.exe"C:\Users\Admin\AppData\Local\Temp\d8367777c05a8973d1ec20f2bf9c0d9908fbae476259209f93e90f7c0ea39e25.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un990471.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un990471.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\03301619.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\03301619.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 10844⤵
- Program crash
PID:1152
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk080542.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk080542.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 19444⤵
- Program crash
PID:2184
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si489419.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si489419.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 448 -ip 4481⤵PID:4320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3840 -ip 38401⤵PID:1444
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
136KB
MD573cae2858379cab7e68b9e5bf751c372
SHA138c375354bda6e5c8fb2579f1ef0416a6c65929a
SHA256e423b9b79b441e48fd15c0980c78bf87ddaab308fa1c5d5ecdfbd85e1da73f1c
SHA512343c2e4470d42c5078a7e4025509779bfd4b92b5c8b71a9e270acb2b98b6b6fcfa04f8158d9c10c468d0984daac5c8f316424df5e4def7db13e8768eb0d7c7d8
-
Filesize
540KB
MD512df23db92c2d78baa717952f68eccd9
SHA14d7e5efb368364e81b8ef867bc04553e44e4b23b
SHA2564a31658e5d99a1851981b30bf51c96b588c4535add97fe5acbe0835ea5bb517f
SHA5122f7129dc4a984739d454176f26273af121222dfa7c38f72ba018dbd0f4f814f07ddd6ed500d075c610a1a6a990be77b38cb93e73f0a23665163a6e1b5adbb52c
-
Filesize
540KB
MD512df23db92c2d78baa717952f68eccd9
SHA14d7e5efb368364e81b8ef867bc04553e44e4b23b
SHA2564a31658e5d99a1851981b30bf51c96b588c4535add97fe5acbe0835ea5bb517f
SHA5122f7129dc4a984739d454176f26273af121222dfa7c38f72ba018dbd0f4f814f07ddd6ed500d075c610a1a6a990be77b38cb93e73f0a23665163a6e1b5adbb52c
-
Filesize
258KB
MD5111bfc82dc596ecd4d63905141c4abeb
SHA1fcca73e8ef559385c817eb4351534308426843b5
SHA256d137843923cb83607b9720fe248cda56c85729982cf7a4127235e63ef3a6a21a
SHA512e97a89160b4ad58a787572f9668f8c0d423190c0bfd587fd1831cf4c648f60c01c52a246e32a214724ec2c4a240e9256352c7aceb073402de8d44da374ffbc87
-
Filesize
258KB
MD5111bfc82dc596ecd4d63905141c4abeb
SHA1fcca73e8ef559385c817eb4351534308426843b5
SHA256d137843923cb83607b9720fe248cda56c85729982cf7a4127235e63ef3a6a21a
SHA512e97a89160b4ad58a787572f9668f8c0d423190c0bfd587fd1831cf4c648f60c01c52a246e32a214724ec2c4a240e9256352c7aceb073402de8d44da374ffbc87
-
Filesize
341KB
MD5516629c5f0d86a72099ca50c445c614d
SHA13d774362c63d490c1946e0cd129738cf55914f9d
SHA25663f9bf82c0458266fe53c6aaf819ce37fb61aa7013a20f44a18a5013f72dd146
SHA5125475491fd785948fc55056630b3f2ac70d8c5249fa2d84b22ef8b557b807a4c7622aae7221235dccfaefd2fc71f550c851b03b9eefaa98721344b5b18ca9e57e
-
Filesize
341KB
MD5516629c5f0d86a72099ca50c445c614d
SHA13d774362c63d490c1946e0cd129738cf55914f9d
SHA25663f9bf82c0458266fe53c6aaf819ce37fb61aa7013a20f44a18a5013f72dd146
SHA5125475491fd785948fc55056630b3f2ac70d8c5249fa2d84b22ef8b557b807a4c7622aae7221235dccfaefd2fc71f550c851b03b9eefaa98721344b5b18ca9e57e