Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
62s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2023, 04:39
Static task
static1
General
-
Target
db5e0a7d7dda10e8498b04b515ea83beffdd8d8a991347a4295d4e4a18864836.exe
-
Size
642KB
-
MD5
2970144e68a0affa649b571c9d555ec8
-
SHA1
578fe9a657c5103e01c1996a7bb848a2318837ad
-
SHA256
db5e0a7d7dda10e8498b04b515ea83beffdd8d8a991347a4295d4e4a18864836
-
SHA512
3a7cb96f9a9621bf3f244a41e9b4f18f2b2819b15008849d2ea37fd96591fe36495df3576ff473b61156af486daadd11ccf97596fcfb8908734e2d35dca55575
-
SSDEEP
12288:/y90D2KUA2tWHhRj9nYlVtB1JiXvlHqWW6jI1qbPK3A+1UQS+VRC:/yC2KhtHfj+b1Evt66jI1qbPorUQJVRC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 26504028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 26504028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 26504028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 26504028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 26504028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 26504028.exe -
Executes dropped EXE 4 IoCs
pid Process 1612 st995672.exe 1644 26504028.exe 1988 kp968585.exe 3768 lr377915.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 26504028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 26504028.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce db5e0a7d7dda10e8498b04b515ea83beffdd8d8a991347a4295d4e4a18864836.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" db5e0a7d7dda10e8498b04b515ea83beffdd8d8a991347a4295d4e4a18864836.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st995672.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st995672.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 888 1988 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1644 26504028.exe 1644 26504028.exe 1988 kp968585.exe 1988 kp968585.exe 3768 lr377915.exe 3768 lr377915.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1644 26504028.exe Token: SeDebugPrivilege 1988 kp968585.exe Token: SeDebugPrivilege 3768 lr377915.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1612 1640 db5e0a7d7dda10e8498b04b515ea83beffdd8d8a991347a4295d4e4a18864836.exe 83 PID 1640 wrote to memory of 1612 1640 db5e0a7d7dda10e8498b04b515ea83beffdd8d8a991347a4295d4e4a18864836.exe 83 PID 1640 wrote to memory of 1612 1640 db5e0a7d7dda10e8498b04b515ea83beffdd8d8a991347a4295d4e4a18864836.exe 83 PID 1612 wrote to memory of 1644 1612 st995672.exe 84 PID 1612 wrote to memory of 1644 1612 st995672.exe 84 PID 1612 wrote to memory of 1644 1612 st995672.exe 84 PID 1612 wrote to memory of 1988 1612 st995672.exe 88 PID 1612 wrote to memory of 1988 1612 st995672.exe 88 PID 1612 wrote to memory of 1988 1612 st995672.exe 88 PID 1640 wrote to memory of 3768 1640 db5e0a7d7dda10e8498b04b515ea83beffdd8d8a991347a4295d4e4a18864836.exe 91 PID 1640 wrote to memory of 3768 1640 db5e0a7d7dda10e8498b04b515ea83beffdd8d8a991347a4295d4e4a18864836.exe 91 PID 1640 wrote to memory of 3768 1640 db5e0a7d7dda10e8498b04b515ea83beffdd8d8a991347a4295d4e4a18864836.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\db5e0a7d7dda10e8498b04b515ea83beffdd8d8a991347a4295d4e4a18864836.exe"C:\Users\Admin\AppData\Local\Temp\db5e0a7d7dda10e8498b04b515ea83beffdd8d8a991347a4295d4e4a18864836.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st995672.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st995672.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26504028.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26504028.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp968585.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp968585.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 11404⤵
- Program crash
PID:888
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr377915.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr377915.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1988 -ip 19881⤵PID:4596
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5bddaadcc91f12566dce088dfba102c2a
SHA16a141a09619ea3f5bbe2d946df9a8c427beb89f2
SHA256536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4
SHA512f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91
-
Filesize
136KB
MD5bddaadcc91f12566dce088dfba102c2a
SHA16a141a09619ea3f5bbe2d946df9a8c427beb89f2
SHA256536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4
SHA512f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91
-
Filesize
488KB
MD5b018fc31e779cdd4b1e8bf87e875b593
SHA1d30a128cf0be7bb8bad4c73f83f40b4997622835
SHA2567cc3b9aab5cd44e57863fe0556a78194f901e7df3e2b38e6726b4b8afed98495
SHA5125ea57b88aa1049957c245c8049d2cb92e6253c523ad487d7a9d0aa65ab05b80eb69ecd17f910bd234e6c6371df171a664d1411ab42ff3c3b38a0409fc3a8a9f8
-
Filesize
488KB
MD5b018fc31e779cdd4b1e8bf87e875b593
SHA1d30a128cf0be7bb8bad4c73f83f40b4997622835
SHA2567cc3b9aab5cd44e57863fe0556a78194f901e7df3e2b38e6726b4b8afed98495
SHA5125ea57b88aa1049957c245c8049d2cb92e6253c523ad487d7a9d0aa65ab05b80eb69ecd17f910bd234e6c6371df171a664d1411ab42ff3c3b38a0409fc3a8a9f8
-
Filesize
176KB
MD52b71f4b18ac8214a2bff547b6ce2f64f
SHA1b8f2f25139a7b2e8d5e8fbc024eb5cac518bc6a5
SHA256f7eedf3aec775a62c265d1652686b30a8a45a953523e2fb3cfc1fac3c6a66fbc
SHA51233518eff768610bf54f9888d9d0d746b0c3500dc5f2b8fd5f1641d5a264f657a8311b40364f70932512581183b244fec3feb535e21c13e0ec8adec9994175177
-
Filesize
176KB
MD52b71f4b18ac8214a2bff547b6ce2f64f
SHA1b8f2f25139a7b2e8d5e8fbc024eb5cac518bc6a5
SHA256f7eedf3aec775a62c265d1652686b30a8a45a953523e2fb3cfc1fac3c6a66fbc
SHA51233518eff768610bf54f9888d9d0d746b0c3500dc5f2b8fd5f1641d5a264f657a8311b40364f70932512581183b244fec3feb535e21c13e0ec8adec9994175177
-
Filesize
340KB
MD549b8c19408a2059b3ef04d26cbd66be5
SHA16827abafa907293098a1f0a3fbb6935429313a05
SHA2563d7cdeb453f6e77e2ce65ee7626ed458196dc4ee5963b2f514f7abb075c350cb
SHA512f4801ef61dbdaa57e597f41cef99f34f6dea082be7ad271a590a8b7902f7b0a107a95b9fa6ba545ce4ad3455fa3e03fc332ac9b5eaa4b736a906af70ad861236
-
Filesize
340KB
MD549b8c19408a2059b3ef04d26cbd66be5
SHA16827abafa907293098a1f0a3fbb6935429313a05
SHA2563d7cdeb453f6e77e2ce65ee7626ed458196dc4ee5963b2f514f7abb075c350cb
SHA512f4801ef61dbdaa57e597f41cef99f34f6dea082be7ad271a590a8b7902f7b0a107a95b9fa6ba545ce4ad3455fa3e03fc332ac9b5eaa4b736a906af70ad861236