Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    61s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/04/2023, 04:21

General

  • Target

    3f58428c72bbf2893f96a86bccde83a9995e48bf28a139d884d7a30abad6e08b.exe

  • Size

    694KB

  • MD5

    040ddd8c33a4afa9ef03b1c1d4de108f

  • SHA1

    f29941c500671d0f102617a2c9abc988799be93f

  • SHA256

    3f58428c72bbf2893f96a86bccde83a9995e48bf28a139d884d7a30abad6e08b

  • SHA512

    cfcf5e00ecae62c211d764543c4eb919c7b7c9a0072c145ef5c9e0bc67c7a6df68c464ffcceedf69b4938cea91111f0ff38f28499e9f3c720c3490b988640e35

  • SSDEEP

    12288:3y90yiNiD+B642b4ByMfZwZFTZTiKqB/nvdW86FV18b2KQA+5MOvrOi9onB:3yyNXBVJhIFJiKqV6FV18b2L4YrSB

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f58428c72bbf2893f96a86bccde83a9995e48bf28a139d884d7a30abad6e08b.exe
    "C:\Users\Admin\AppData\Local\Temp\3f58428c72bbf2893f96a86bccde83a9995e48bf28a139d884d7a30abad6e08b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:868
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un762035.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un762035.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2112
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\24144525.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\24144525.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4644
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 1080
          4⤵
          • Program crash
          PID:3492
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk035535.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk035535.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4008
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 1324
          4⤵
          • Program crash
          PID:2524
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si784543.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si784543.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2008
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4644 -ip 4644
    1⤵
      PID:2960
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4008 -ip 4008
      1⤵
        PID:2908

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si784543.exe

        Filesize

        136KB

        MD5

        bddaadcc91f12566dce088dfba102c2a

        SHA1

        6a141a09619ea3f5bbe2d946df9a8c427beb89f2

        SHA256

        536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4

        SHA512

        f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si784543.exe

        Filesize

        136KB

        MD5

        bddaadcc91f12566dce088dfba102c2a

        SHA1

        6a141a09619ea3f5bbe2d946df9a8c427beb89f2

        SHA256

        536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4

        SHA512

        f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un762035.exe

        Filesize

        540KB

        MD5

        4f69d4211c42cfe388346138ecde3fa6

        SHA1

        5ecd0770c3f15576bf8055ebef90733cd50fe2ec

        SHA256

        b2e2e316af58bf8bcc504a98b3732336cb8a465c98be3b9529a8fa839ba2de36

        SHA512

        76d11675f7bfc9e650de292c20a80aac9ff7b267612cb77032e9973c78c4d18b81778f7aff0f1b4a59fe497025f5545daaa8fe9b3051284e9ce09078f84ce501

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un762035.exe

        Filesize

        540KB

        MD5

        4f69d4211c42cfe388346138ecde3fa6

        SHA1

        5ecd0770c3f15576bf8055ebef90733cd50fe2ec

        SHA256

        b2e2e316af58bf8bcc504a98b3732336cb8a465c98be3b9529a8fa839ba2de36

        SHA512

        76d11675f7bfc9e650de292c20a80aac9ff7b267612cb77032e9973c78c4d18b81778f7aff0f1b4a59fe497025f5545daaa8fe9b3051284e9ce09078f84ce501

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\24144525.exe

        Filesize

        258KB

        MD5

        3ed59d7db5ae7608d80cdf7c645707aa

        SHA1

        307e261f99a1b67e26f285d27c333c9ccb1219c8

        SHA256

        861bf23756c6cd0fc2050bd63314176d73af7487a06f9237b7a15f14d0363365

        SHA512

        b9092ee4dc47a979184766923b2394c8d770b9a7a963a011d039bd49c14f798a8e87ff79c55421e16c260571027c83059d76507492c4323743b060dd32e37392

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\24144525.exe

        Filesize

        258KB

        MD5

        3ed59d7db5ae7608d80cdf7c645707aa

        SHA1

        307e261f99a1b67e26f285d27c333c9ccb1219c8

        SHA256

        861bf23756c6cd0fc2050bd63314176d73af7487a06f9237b7a15f14d0363365

        SHA512

        b9092ee4dc47a979184766923b2394c8d770b9a7a963a011d039bd49c14f798a8e87ff79c55421e16c260571027c83059d76507492c4323743b060dd32e37392

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk035535.exe

        Filesize

        340KB

        MD5

        3b50511df8792718e908e32c9f4a31f0

        SHA1

        e28cf9653e17c8c7a43bee22d9bfe08e99dc48d7

        SHA256

        4ec48d3b98848e13836ff0478139c881b3196769b669ed7edbb4a5c8bbf7acda

        SHA512

        2274d965e4f00588e3260ddc8ab01f0b11564fcaef89d8d2528315f56d76d163e939e4a618f56b54d01b90a21f9baa08dd802fe78be78dc38e0ce88ff84a7f06

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk035535.exe

        Filesize

        340KB

        MD5

        3b50511df8792718e908e32c9f4a31f0

        SHA1

        e28cf9653e17c8c7a43bee22d9bfe08e99dc48d7

        SHA256

        4ec48d3b98848e13836ff0478139c881b3196769b669ed7edbb4a5c8bbf7acda

        SHA512

        2274d965e4f00588e3260ddc8ab01f0b11564fcaef89d8d2528315f56d76d163e939e4a618f56b54d01b90a21f9baa08dd802fe78be78dc38e0ce88ff84a7f06

      • memory/2008-1006-0x0000000007660000-0x0000000007670000-memory.dmp

        Filesize

        64KB

      • memory/2008-1005-0x00000000008E0000-0x0000000000908000-memory.dmp

        Filesize

        160KB

      • memory/4008-335-0x0000000007320000-0x0000000007330000-memory.dmp

        Filesize

        64KB

      • memory/4008-987-0x0000000009C60000-0x000000000A278000-memory.dmp

        Filesize

        6.1MB

      • memory/4008-998-0x000000000B4B0000-0x000000000B9DC000-memory.dmp

        Filesize

        5.2MB

      • memory/4008-997-0x000000000B2D0000-0x000000000B492000-memory.dmp

        Filesize

        1.8MB

      • memory/4008-996-0x000000000B040000-0x000000000B090000-memory.dmp

        Filesize

        320KB

      • memory/4008-995-0x000000000AF80000-0x000000000AF9E000-memory.dmp

        Filesize

        120KB

      • memory/4008-994-0x000000000AEC0000-0x000000000AF36000-memory.dmp

        Filesize

        472KB

      • memory/4008-993-0x000000000AE10000-0x000000000AEA2000-memory.dmp

        Filesize

        584KB

      • memory/4008-992-0x000000000A740000-0x000000000A7A6000-memory.dmp

        Filesize

        408KB

      • memory/4008-991-0x0000000007320000-0x0000000007330000-memory.dmp

        Filesize

        64KB

      • memory/4008-990-0x000000000A480000-0x000000000A4BC000-memory.dmp

        Filesize

        240KB

      • memory/4008-989-0x000000000A320000-0x000000000A42A000-memory.dmp

        Filesize

        1.0MB

      • memory/4008-988-0x000000000A300000-0x000000000A312000-memory.dmp

        Filesize

        72KB

      • memory/4008-333-0x0000000007320000-0x0000000007330000-memory.dmp

        Filesize

        64KB

      • memory/4008-329-0x0000000002BF0000-0x0000000002C36000-memory.dmp

        Filesize

        280KB

      • memory/4008-331-0x0000000007320000-0x0000000007330000-memory.dmp

        Filesize

        64KB

      • memory/4008-224-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/4008-222-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/4008-220-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/4008-218-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/4008-216-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/4008-192-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/4008-191-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/4008-194-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/4008-196-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/4008-198-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/4008-200-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/4008-202-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/4008-204-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/4008-206-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/4008-208-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/4008-210-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/4008-212-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/4008-214-0x0000000007170000-0x00000000071A5000-memory.dmp

        Filesize

        212KB

      • memory/4644-174-0x0000000004CA0000-0x0000000004CB3000-memory.dmp

        Filesize

        76KB

      • memory/4644-150-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/4644-186-0x0000000000400000-0x0000000002B9B000-memory.dmp

        Filesize

        39.6MB

      • memory/4644-185-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/4644-182-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/4644-183-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/4644-181-0x0000000000400000-0x0000000002B9B000-memory.dmp

        Filesize

        39.6MB

      • memory/4644-152-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/4644-180-0x0000000004CA0000-0x0000000004CB3000-memory.dmp

        Filesize

        76KB

      • memory/4644-156-0x0000000004CA0000-0x0000000004CB3000-memory.dmp

        Filesize

        76KB

      • memory/4644-178-0x0000000004CA0000-0x0000000004CB3000-memory.dmp

        Filesize

        76KB

      • memory/4644-176-0x0000000004CA0000-0x0000000004CB3000-memory.dmp

        Filesize

        76KB

      • memory/4644-154-0x0000000004CA0000-0x0000000004CB3000-memory.dmp

        Filesize

        76KB

      • memory/4644-170-0x0000000004CA0000-0x0000000004CB3000-memory.dmp

        Filesize

        76KB

      • memory/4644-153-0x0000000004CA0000-0x0000000004CB3000-memory.dmp

        Filesize

        76KB

      • memory/4644-168-0x0000000004CA0000-0x0000000004CB3000-memory.dmp

        Filesize

        76KB

      • memory/4644-166-0x0000000004CA0000-0x0000000004CB3000-memory.dmp

        Filesize

        76KB

      • memory/4644-164-0x0000000004CA0000-0x0000000004CB3000-memory.dmp

        Filesize

        76KB

      • memory/4644-162-0x0000000004CA0000-0x0000000004CB3000-memory.dmp

        Filesize

        76KB

      • memory/4644-160-0x0000000004CA0000-0x0000000004CB3000-memory.dmp

        Filesize

        76KB

      • memory/4644-158-0x0000000004CA0000-0x0000000004CB3000-memory.dmp

        Filesize

        76KB

      • memory/4644-172-0x0000000004CA0000-0x0000000004CB3000-memory.dmp

        Filesize

        76KB

      • memory/4644-149-0x0000000002CC0000-0x0000000002CED000-memory.dmp

        Filesize

        180KB

      • memory/4644-151-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/4644-148-0x0000000007200000-0x00000000077A4000-memory.dmp

        Filesize

        5.6MB