Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    50s
  • max time network
    75s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26/04/2023, 04:43

General

  • Target

    a2f89785b080148e1fa8116883f368f701288fb79fa4f798847c8559ab3c18c2.exe

  • Size

    694KB

  • MD5

    0bfa9d898b9cd20ac3894c846854cfbf

  • SHA1

    a36fa14d36b1bad91014dced45489d6e47c7e6ea

  • SHA256

    a2f89785b080148e1fa8116883f368f701288fb79fa4f798847c8559ab3c18c2

  • SHA512

    b198722929607b1376c5dc61bfbe515dcd24eeb2b6ea7ddc0814a7bff63b6bbe594dc1a8b203bde403d3008a0ee10ca39705a60379fd59a5a7164da11390bd22

  • SSDEEP

    12288:gy9025jtTC0VxqJoPk6U5wpFT4u1WkCAg7SdpWj6F018bwKTA+tGTOmRmR:gyxpRVxqJOkJoF/1I4O6F018bw4PIwR

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2f89785b080148e1fa8116883f368f701288fb79fa4f798847c8559ab3c18c2.exe
    "C:\Users\Admin\AppData\Local\Temp\a2f89785b080148e1fa8116883f368f701288fb79fa4f798847c8559ab3c18c2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4448
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un801889.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un801889.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5048
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\82549359.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\82549359.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3560
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk244943.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk244943.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3724
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si845574.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si845574.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4056

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si845574.exe

    Filesize

    136KB

    MD5

    bddaadcc91f12566dce088dfba102c2a

    SHA1

    6a141a09619ea3f5bbe2d946df9a8c427beb89f2

    SHA256

    536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4

    SHA512

    f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si845574.exe

    Filesize

    136KB

    MD5

    bddaadcc91f12566dce088dfba102c2a

    SHA1

    6a141a09619ea3f5bbe2d946df9a8c427beb89f2

    SHA256

    536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4

    SHA512

    f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un801889.exe

    Filesize

    540KB

    MD5

    6f0bf58f36dd27bdebf4ca64e4105a3c

    SHA1

    384b362c27699019e6f3a650fa87846e051dd8f2

    SHA256

    b4523fa4ff65109ea7951fa2acad13dfa55b62144659cd83b7043654ced8f68f

    SHA512

    1337c98f3622d4efc6e9d63b17a4710669f5420dc3f9cbfca86f633bbc8ca9d14375577a9b6ece1e92add611d4897204fc179e7239e2d9f11a1f10fa3f853f29

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un801889.exe

    Filesize

    540KB

    MD5

    6f0bf58f36dd27bdebf4ca64e4105a3c

    SHA1

    384b362c27699019e6f3a650fa87846e051dd8f2

    SHA256

    b4523fa4ff65109ea7951fa2acad13dfa55b62144659cd83b7043654ced8f68f

    SHA512

    1337c98f3622d4efc6e9d63b17a4710669f5420dc3f9cbfca86f633bbc8ca9d14375577a9b6ece1e92add611d4897204fc179e7239e2d9f11a1f10fa3f853f29

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\82549359.exe

    Filesize

    258KB

    MD5

    41033df7bd2df763cc78b789c83a3e18

    SHA1

    df7b51950982b3b3ed5e52413069ec9de01d15b6

    SHA256

    35663839ea8b4565f796dd0e7db796a66fb127104c74c0c7a0ddc22c4e3abd6d

    SHA512

    ede9170a86d866c6a4306e46526813764b7d7999d51034f818a49bb8f1890fba21d2f416189f6828af221d710ee2bd17fda4c1ccd9487954042f15f4b477186b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\82549359.exe

    Filesize

    258KB

    MD5

    41033df7bd2df763cc78b789c83a3e18

    SHA1

    df7b51950982b3b3ed5e52413069ec9de01d15b6

    SHA256

    35663839ea8b4565f796dd0e7db796a66fb127104c74c0c7a0ddc22c4e3abd6d

    SHA512

    ede9170a86d866c6a4306e46526813764b7d7999d51034f818a49bb8f1890fba21d2f416189f6828af221d710ee2bd17fda4c1ccd9487954042f15f4b477186b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk244943.exe

    Filesize

    340KB

    MD5

    16b5655add17b40a71aab2efdee70eb2

    SHA1

    6090afa2f189cdc68674cb9a6f1cb971ba02d008

    SHA256

    9a396d78ec08a23ed011aa0fe747efa504e083613147a72ab6cb37f5f0335e21

    SHA512

    c79177c8e9e115562d16de41c126c3dc2d29adeb76a61b1406e0f63ea64bd06231f732f65ac6919bed6d1c2121dd18e866a044babebbd9b88ad16ccbb5f83bd6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk244943.exe

    Filesize

    340KB

    MD5

    16b5655add17b40a71aab2efdee70eb2

    SHA1

    6090afa2f189cdc68674cb9a6f1cb971ba02d008

    SHA256

    9a396d78ec08a23ed011aa0fe747efa504e083613147a72ab6cb37f5f0335e21

    SHA512

    c79177c8e9e115562d16de41c126c3dc2d29adeb76a61b1406e0f63ea64bd06231f732f65ac6919bed6d1c2121dd18e866a044babebbd9b88ad16ccbb5f83bd6

  • memory/3560-135-0x00000000048B0000-0x00000000048CA000-memory.dmp

    Filesize

    104KB

  • memory/3560-136-0x0000000007350000-0x000000000784E000-memory.dmp

    Filesize

    5.0MB

  • memory/3560-137-0x0000000004BB0000-0x0000000004BC8000-memory.dmp

    Filesize

    96KB

  • memory/3560-138-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3560-139-0x0000000002F50000-0x0000000002F60000-memory.dmp

    Filesize

    64KB

  • memory/3560-140-0x0000000002F50000-0x0000000002F60000-memory.dmp

    Filesize

    64KB

  • memory/3560-141-0x0000000002F50000-0x0000000002F60000-memory.dmp

    Filesize

    64KB

  • memory/3560-142-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

    Filesize

    76KB

  • memory/3560-143-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

    Filesize

    76KB

  • memory/3560-145-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

    Filesize

    76KB

  • memory/3560-147-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

    Filesize

    76KB

  • memory/3560-149-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

    Filesize

    76KB

  • memory/3560-151-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

    Filesize

    76KB

  • memory/3560-153-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

    Filesize

    76KB

  • memory/3560-155-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

    Filesize

    76KB

  • memory/3560-157-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

    Filesize

    76KB

  • memory/3560-159-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

    Filesize

    76KB

  • memory/3560-161-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

    Filesize

    76KB

  • memory/3560-163-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

    Filesize

    76KB

  • memory/3560-165-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

    Filesize

    76KB

  • memory/3560-167-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

    Filesize

    76KB

  • memory/3560-169-0x0000000004BB0000-0x0000000004BC3000-memory.dmp

    Filesize

    76KB

  • memory/3560-170-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/3560-172-0x0000000002F50000-0x0000000002F60000-memory.dmp

    Filesize

    64KB

  • memory/3560-171-0x0000000002F50000-0x0000000002F60000-memory.dmp

    Filesize

    64KB

  • memory/3560-174-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/3724-179-0x0000000004A70000-0x0000000004AAC000-memory.dmp

    Filesize

    240KB

  • memory/3724-180-0x0000000007110000-0x000000000714A000-memory.dmp

    Filesize

    232KB

  • memory/3724-181-0x0000000007110000-0x0000000007145000-memory.dmp

    Filesize

    212KB

  • memory/3724-182-0x0000000007110000-0x0000000007145000-memory.dmp

    Filesize

    212KB

  • memory/3724-184-0x0000000007110000-0x0000000007145000-memory.dmp

    Filesize

    212KB

  • memory/3724-186-0x0000000007110000-0x0000000007145000-memory.dmp

    Filesize

    212KB

  • memory/3724-187-0x0000000002CC0000-0x0000000002D06000-memory.dmp

    Filesize

    280KB

  • memory/3724-188-0x0000000007220000-0x0000000007230000-memory.dmp

    Filesize

    64KB

  • memory/3724-191-0x0000000007110000-0x0000000007145000-memory.dmp

    Filesize

    212KB

  • memory/3724-194-0x0000000007110000-0x0000000007145000-memory.dmp

    Filesize

    212KB

  • memory/3724-193-0x0000000007220000-0x0000000007230000-memory.dmp

    Filesize

    64KB

  • memory/3724-190-0x0000000007220000-0x0000000007230000-memory.dmp

    Filesize

    64KB

  • memory/3724-196-0x0000000007110000-0x0000000007145000-memory.dmp

    Filesize

    212KB

  • memory/3724-198-0x0000000007110000-0x0000000007145000-memory.dmp

    Filesize

    212KB

  • memory/3724-200-0x0000000007110000-0x0000000007145000-memory.dmp

    Filesize

    212KB

  • memory/3724-202-0x0000000007110000-0x0000000007145000-memory.dmp

    Filesize

    212KB

  • memory/3724-204-0x0000000007110000-0x0000000007145000-memory.dmp

    Filesize

    212KB

  • memory/3724-206-0x0000000007110000-0x0000000007145000-memory.dmp

    Filesize

    212KB

  • memory/3724-208-0x0000000007110000-0x0000000007145000-memory.dmp

    Filesize

    212KB

  • memory/3724-210-0x0000000007110000-0x0000000007145000-memory.dmp

    Filesize

    212KB

  • memory/3724-212-0x0000000007110000-0x0000000007145000-memory.dmp

    Filesize

    212KB

  • memory/3724-214-0x0000000007110000-0x0000000007145000-memory.dmp

    Filesize

    212KB

  • memory/3724-216-0x0000000007110000-0x0000000007145000-memory.dmp

    Filesize

    212KB

  • memory/3724-218-0x0000000007110000-0x0000000007145000-memory.dmp

    Filesize

    212KB

  • memory/3724-977-0x000000000A1C0000-0x000000000A7C6000-memory.dmp

    Filesize

    6.0MB

  • memory/3724-978-0x0000000009BE0000-0x0000000009BF2000-memory.dmp

    Filesize

    72KB

  • memory/3724-979-0x0000000009C10000-0x0000000009D1A000-memory.dmp

    Filesize

    1.0MB

  • memory/3724-980-0x0000000009D30000-0x0000000009D6E000-memory.dmp

    Filesize

    248KB

  • memory/3724-981-0x0000000009EB0000-0x0000000009EFB000-memory.dmp

    Filesize

    300KB

  • memory/3724-982-0x0000000007220000-0x0000000007230000-memory.dmp

    Filesize

    64KB

  • memory/3724-983-0x000000000A040000-0x000000000A0A6000-memory.dmp

    Filesize

    408KB

  • memory/3724-984-0x000000000AD30000-0x000000000ADC2000-memory.dmp

    Filesize

    584KB

  • memory/3724-985-0x000000000ADD0000-0x000000000AE46000-memory.dmp

    Filesize

    472KB

  • memory/3724-986-0x000000000AE80000-0x000000000AE9E000-memory.dmp

    Filesize

    120KB

  • memory/3724-987-0x000000000B040000-0x000000000B202000-memory.dmp

    Filesize

    1.8MB

  • memory/3724-988-0x000000000B210000-0x000000000B73C000-memory.dmp

    Filesize

    5.2MB

  • memory/3724-989-0x0000000004AC0000-0x0000000004B10000-memory.dmp

    Filesize

    320KB

  • memory/4056-995-0x00000000006A0000-0x00000000006C8000-memory.dmp

    Filesize

    160KB

  • memory/4056-996-0x0000000007420000-0x000000000746B000-memory.dmp

    Filesize

    300KB

  • memory/4056-997-0x00000000076E0000-0x00000000076F0000-memory.dmp

    Filesize

    64KB