Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
50s -
max time network
75s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
26/04/2023, 04:43
Static task
static1
General
-
Target
a2f89785b080148e1fa8116883f368f701288fb79fa4f798847c8559ab3c18c2.exe
-
Size
694KB
-
MD5
0bfa9d898b9cd20ac3894c846854cfbf
-
SHA1
a36fa14d36b1bad91014dced45489d6e47c7e6ea
-
SHA256
a2f89785b080148e1fa8116883f368f701288fb79fa4f798847c8559ab3c18c2
-
SHA512
b198722929607b1376c5dc61bfbe515dcd24eeb2b6ea7ddc0814a7bff63b6bbe594dc1a8b203bde403d3008a0ee10ca39705a60379fd59a5a7164da11390bd22
-
SSDEEP
12288:gy9025jtTC0VxqJoPk6U5wpFT4u1WkCAg7SdpWj6F018bwKTA+tGTOmRmR:gyxpRVxqJOkJoF/1I4O6F018bw4PIwR
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 82549359.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 82549359.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 82549359.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 82549359.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 82549359.exe -
Executes dropped EXE 4 IoCs
pid Process 5048 un801889.exe 3560 82549359.exe 3724 rk244943.exe 4056 si845574.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 82549359.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 82549359.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a2f89785b080148e1fa8116883f368f701288fb79fa4f798847c8559ab3c18c2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a2f89785b080148e1fa8116883f368f701288fb79fa4f798847c8559ab3c18c2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un801889.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un801889.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3560 82549359.exe 3560 82549359.exe 3724 rk244943.exe 3724 rk244943.exe 4056 si845574.exe 4056 si845574.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3560 82549359.exe Token: SeDebugPrivilege 3724 rk244943.exe Token: SeDebugPrivilege 4056 si845574.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4448 wrote to memory of 5048 4448 a2f89785b080148e1fa8116883f368f701288fb79fa4f798847c8559ab3c18c2.exe 66 PID 4448 wrote to memory of 5048 4448 a2f89785b080148e1fa8116883f368f701288fb79fa4f798847c8559ab3c18c2.exe 66 PID 4448 wrote to memory of 5048 4448 a2f89785b080148e1fa8116883f368f701288fb79fa4f798847c8559ab3c18c2.exe 66 PID 5048 wrote to memory of 3560 5048 un801889.exe 67 PID 5048 wrote to memory of 3560 5048 un801889.exe 67 PID 5048 wrote to memory of 3560 5048 un801889.exe 67 PID 5048 wrote to memory of 3724 5048 un801889.exe 68 PID 5048 wrote to memory of 3724 5048 un801889.exe 68 PID 5048 wrote to memory of 3724 5048 un801889.exe 68 PID 4448 wrote to memory of 4056 4448 a2f89785b080148e1fa8116883f368f701288fb79fa4f798847c8559ab3c18c2.exe 70 PID 4448 wrote to memory of 4056 4448 a2f89785b080148e1fa8116883f368f701288fb79fa4f798847c8559ab3c18c2.exe 70 PID 4448 wrote to memory of 4056 4448 a2f89785b080148e1fa8116883f368f701288fb79fa4f798847c8559ab3c18c2.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2f89785b080148e1fa8116883f368f701288fb79fa4f798847c8559ab3c18c2.exe"C:\Users\Admin\AppData\Local\Temp\a2f89785b080148e1fa8116883f368f701288fb79fa4f798847c8559ab3c18c2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un801889.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un801889.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\82549359.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\82549359.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3560
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk244943.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk244943.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si845574.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si845574.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4056
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5bddaadcc91f12566dce088dfba102c2a
SHA16a141a09619ea3f5bbe2d946df9a8c427beb89f2
SHA256536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4
SHA512f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91
-
Filesize
136KB
MD5bddaadcc91f12566dce088dfba102c2a
SHA16a141a09619ea3f5bbe2d946df9a8c427beb89f2
SHA256536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4
SHA512f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91
-
Filesize
540KB
MD56f0bf58f36dd27bdebf4ca64e4105a3c
SHA1384b362c27699019e6f3a650fa87846e051dd8f2
SHA256b4523fa4ff65109ea7951fa2acad13dfa55b62144659cd83b7043654ced8f68f
SHA5121337c98f3622d4efc6e9d63b17a4710669f5420dc3f9cbfca86f633bbc8ca9d14375577a9b6ece1e92add611d4897204fc179e7239e2d9f11a1f10fa3f853f29
-
Filesize
540KB
MD56f0bf58f36dd27bdebf4ca64e4105a3c
SHA1384b362c27699019e6f3a650fa87846e051dd8f2
SHA256b4523fa4ff65109ea7951fa2acad13dfa55b62144659cd83b7043654ced8f68f
SHA5121337c98f3622d4efc6e9d63b17a4710669f5420dc3f9cbfca86f633bbc8ca9d14375577a9b6ece1e92add611d4897204fc179e7239e2d9f11a1f10fa3f853f29
-
Filesize
258KB
MD541033df7bd2df763cc78b789c83a3e18
SHA1df7b51950982b3b3ed5e52413069ec9de01d15b6
SHA25635663839ea8b4565f796dd0e7db796a66fb127104c74c0c7a0ddc22c4e3abd6d
SHA512ede9170a86d866c6a4306e46526813764b7d7999d51034f818a49bb8f1890fba21d2f416189f6828af221d710ee2bd17fda4c1ccd9487954042f15f4b477186b
-
Filesize
258KB
MD541033df7bd2df763cc78b789c83a3e18
SHA1df7b51950982b3b3ed5e52413069ec9de01d15b6
SHA25635663839ea8b4565f796dd0e7db796a66fb127104c74c0c7a0ddc22c4e3abd6d
SHA512ede9170a86d866c6a4306e46526813764b7d7999d51034f818a49bb8f1890fba21d2f416189f6828af221d710ee2bd17fda4c1ccd9487954042f15f4b477186b
-
Filesize
340KB
MD516b5655add17b40a71aab2efdee70eb2
SHA16090afa2f189cdc68674cb9a6f1cb971ba02d008
SHA2569a396d78ec08a23ed011aa0fe747efa504e083613147a72ab6cb37f5f0335e21
SHA512c79177c8e9e115562d16de41c126c3dc2d29adeb76a61b1406e0f63ea64bd06231f732f65ac6919bed6d1c2121dd18e866a044babebbd9b88ad16ccbb5f83bd6
-
Filesize
340KB
MD516b5655add17b40a71aab2efdee70eb2
SHA16090afa2f189cdc68674cb9a6f1cb971ba02d008
SHA2569a396d78ec08a23ed011aa0fe747efa504e083613147a72ab6cb37f5f0335e21
SHA512c79177c8e9e115562d16de41c126c3dc2d29adeb76a61b1406e0f63ea64bd06231f732f65ac6919bed6d1c2121dd18e866a044babebbd9b88ad16ccbb5f83bd6