Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/04/2023, 05:09

General

  • Target

    c96daa6f7b8ef6b94885b7a75143fbc248f4409246d41dd0479ce343889d4a52.exe

  • Size

    694KB

  • MD5

    8ae5aef7737d7024cbfaeba4c3aad5ff

  • SHA1

    f579e1f6e7e252aff037ad94771da07bdc35c8f3

  • SHA256

    c96daa6f7b8ef6b94885b7a75143fbc248f4409246d41dd0479ce343889d4a52

  • SHA512

    0d35d6b37f87b7aa1f39f75c807c9cb420771576d9a7004300ce2e08e767d1dcecf7a87e423a29af6207b799e3d114524a9ad867bb01d384a44d388eb5af4e76

  • SSDEEP

    12288:/y90vaft1Piqz0EPk6FCwpFTeQFRQ716WD6Fq18bwKTA+9Ga275jZpg+5:/y2Y3Piqz0qkRoFFFRwv6Fq18bw4nw5v

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c96daa6f7b8ef6b94885b7a75143fbc248f4409246d41dd0479ce343889d4a52.exe
    "C:\Users\Admin\AppData\Local\Temp\c96daa6f7b8ef6b94885b7a75143fbc248f4409246d41dd0479ce343889d4a52.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un818314.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un818314.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4496
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\39930990.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\39930990.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4636
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 1080
          4⤵
          • Program crash
          PID:4300
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk955195.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk955195.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4812
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4812 -s 1344
          4⤵
          • Program crash
          PID:2704
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si818940.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si818940.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4076
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4636 -ip 4636
    1⤵
      PID:4356
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4812 -ip 4812
      1⤵
        PID:4144
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:4980

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si818940.exe

        Filesize

        136KB

        MD5

        bddaadcc91f12566dce088dfba102c2a

        SHA1

        6a141a09619ea3f5bbe2d946df9a8c427beb89f2

        SHA256

        536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4

        SHA512

        f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si818940.exe

        Filesize

        136KB

        MD5

        bddaadcc91f12566dce088dfba102c2a

        SHA1

        6a141a09619ea3f5bbe2d946df9a8c427beb89f2

        SHA256

        536a77d74988fc47e1d6b53be4701d289ecf4e3598b02adcd936b4f29017a4f4

        SHA512

        f4b12e80f23ddbfd3c9fa79a009cb04e372f1ef6b48ea947b8c0fb14dfd3240c497be28023c78005b8dfd36a4080d98a9750606edf0a1fdfe57f53ef494e5c91

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un818314.exe

        Filesize

        540KB

        MD5

        fee5c1ae5d30601fbf890a9825afd508

        SHA1

        e107d545283f29c444ef852edcb86840938c93cd

        SHA256

        0f3535db57c7738d912fb84df985d3de6d2672eb4a0bbe5dfea20323811f712b

        SHA512

        2412942f1daa8f7cdafffa0ab8b3b60d4ebe4ab417bc6bd3ec2cd6052f694e64e7d88a1081fc7eb16e4eb2fdbdb98e30abb34c191748e8e8eb115fac5f36e799

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un818314.exe

        Filesize

        540KB

        MD5

        fee5c1ae5d30601fbf890a9825afd508

        SHA1

        e107d545283f29c444ef852edcb86840938c93cd

        SHA256

        0f3535db57c7738d912fb84df985d3de6d2672eb4a0bbe5dfea20323811f712b

        SHA512

        2412942f1daa8f7cdafffa0ab8b3b60d4ebe4ab417bc6bd3ec2cd6052f694e64e7d88a1081fc7eb16e4eb2fdbdb98e30abb34c191748e8e8eb115fac5f36e799

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\39930990.exe

        Filesize

        258KB

        MD5

        94281f2b505dfe06595807aedc8a1d80

        SHA1

        595702e16a9603f9731f16cad32c8787f946b635

        SHA256

        8998d7a317561f3b52adddd016f7ff70652c3fc6411a691c08c6a17cf76f9200

        SHA512

        56e1f80bdca1c83d4438665e165b2dddfe40eb081656087dc4499f0904682a0d69d3cd61bb10eb681d1680dda3c811783fa65c1693abe3e8a352a9188598535a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\39930990.exe

        Filesize

        258KB

        MD5

        94281f2b505dfe06595807aedc8a1d80

        SHA1

        595702e16a9603f9731f16cad32c8787f946b635

        SHA256

        8998d7a317561f3b52adddd016f7ff70652c3fc6411a691c08c6a17cf76f9200

        SHA512

        56e1f80bdca1c83d4438665e165b2dddfe40eb081656087dc4499f0904682a0d69d3cd61bb10eb681d1680dda3c811783fa65c1693abe3e8a352a9188598535a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk955195.exe

        Filesize

        340KB

        MD5

        4e171f42f7bb14891d4d641bb3627fda

        SHA1

        e10a4ead2a17c7a67a7799ea1bfb2832272064aa

        SHA256

        228be8889062b5a7bbb8b6847035bb80a16926861d7d564336800c8685d7094a

        SHA512

        028b9d06661033196ac91b336d95e5734f43dd636bcb7190bc07cdb36bf2623b33799ba2f323359a836a46d484bdf5cecbbed75e2f71031010f25898d20d23a8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk955195.exe

        Filesize

        340KB

        MD5

        4e171f42f7bb14891d4d641bb3627fda

        SHA1

        e10a4ead2a17c7a67a7799ea1bfb2832272064aa

        SHA256

        228be8889062b5a7bbb8b6847035bb80a16926861d7d564336800c8685d7094a

        SHA512

        028b9d06661033196ac91b336d95e5734f43dd636bcb7190bc07cdb36bf2623b33799ba2f323359a836a46d484bdf5cecbbed75e2f71031010f25898d20d23a8

      • memory/4076-1004-0x0000000006E00000-0x0000000006E10000-memory.dmp

        Filesize

        64KB

      • memory/4076-1003-0x0000000000070000-0x0000000000098000-memory.dmp

        Filesize

        160KB

      • memory/4636-156-0x0000000007810000-0x0000000007823000-memory.dmp

        Filesize

        76KB

      • memory/4636-170-0x0000000007810000-0x0000000007823000-memory.dmp

        Filesize

        76KB

      • memory/4636-151-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/4636-152-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/4636-153-0x0000000007810000-0x0000000007823000-memory.dmp

        Filesize

        76KB

      • memory/4636-154-0x0000000007810000-0x0000000007823000-memory.dmp

        Filesize

        76KB

      • memory/4636-149-0x0000000002BE0000-0x0000000002C0D000-memory.dmp

        Filesize

        180KB

      • memory/4636-158-0x0000000007810000-0x0000000007823000-memory.dmp

        Filesize

        76KB

      • memory/4636-160-0x0000000007810000-0x0000000007823000-memory.dmp

        Filesize

        76KB

      • memory/4636-162-0x0000000007810000-0x0000000007823000-memory.dmp

        Filesize

        76KB

      • memory/4636-164-0x0000000007810000-0x0000000007823000-memory.dmp

        Filesize

        76KB

      • memory/4636-166-0x0000000007810000-0x0000000007823000-memory.dmp

        Filesize

        76KB

      • memory/4636-168-0x0000000007810000-0x0000000007823000-memory.dmp

        Filesize

        76KB

      • memory/4636-150-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/4636-172-0x0000000007810000-0x0000000007823000-memory.dmp

        Filesize

        76KB

      • memory/4636-174-0x0000000007810000-0x0000000007823000-memory.dmp

        Filesize

        76KB

      • memory/4636-176-0x0000000007810000-0x0000000007823000-memory.dmp

        Filesize

        76KB

      • memory/4636-178-0x0000000007810000-0x0000000007823000-memory.dmp

        Filesize

        76KB

      • memory/4636-180-0x0000000007810000-0x0000000007823000-memory.dmp

        Filesize

        76KB

      • memory/4636-181-0x0000000000400000-0x0000000002B9B000-memory.dmp

        Filesize

        39.6MB

      • memory/4636-182-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/4636-183-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/4636-184-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/4636-186-0x0000000000400000-0x0000000002B9B000-memory.dmp

        Filesize

        39.6MB

      • memory/4636-148-0x0000000007220000-0x00000000077C4000-memory.dmp

        Filesize

        5.6MB

      • memory/4812-191-0x0000000004D50000-0x0000000004D85000-memory.dmp

        Filesize

        212KB

      • memory/4812-194-0x0000000004D50000-0x0000000004D85000-memory.dmp

        Filesize

        212KB

      • memory/4812-196-0x0000000004D50000-0x0000000004D85000-memory.dmp

        Filesize

        212KB

      • memory/4812-198-0x0000000004D50000-0x0000000004D85000-memory.dmp

        Filesize

        212KB

      • memory/4812-200-0x0000000004D50000-0x0000000004D85000-memory.dmp

        Filesize

        212KB

      • memory/4812-202-0x0000000004D50000-0x0000000004D85000-memory.dmp

        Filesize

        212KB

      • memory/4812-204-0x0000000004D50000-0x0000000004D85000-memory.dmp

        Filesize

        212KB

      • memory/4812-207-0x0000000004D50000-0x0000000004D85000-memory.dmp

        Filesize

        212KB

      • memory/4812-206-0x0000000002CD0000-0x0000000002D16000-memory.dmp

        Filesize

        280KB

      • memory/4812-208-0x00000000073C0000-0x00000000073D0000-memory.dmp

        Filesize

        64KB

      • memory/4812-211-0x0000000004D50000-0x0000000004D85000-memory.dmp

        Filesize

        212KB

      • memory/4812-210-0x00000000073C0000-0x00000000073D0000-memory.dmp

        Filesize

        64KB

      • memory/4812-213-0x0000000004D50000-0x0000000004D85000-memory.dmp

        Filesize

        212KB

      • memory/4812-215-0x0000000004D50000-0x0000000004D85000-memory.dmp

        Filesize

        212KB

      • memory/4812-217-0x0000000004D50000-0x0000000004D85000-memory.dmp

        Filesize

        212KB

      • memory/4812-219-0x0000000004D50000-0x0000000004D85000-memory.dmp

        Filesize

        212KB

      • memory/4812-221-0x0000000004D50000-0x0000000004D85000-memory.dmp

        Filesize

        212KB

      • memory/4812-223-0x0000000004D50000-0x0000000004D85000-memory.dmp

        Filesize

        212KB

      • memory/4812-225-0x0000000004D50000-0x0000000004D85000-memory.dmp

        Filesize

        212KB

      • memory/4812-227-0x0000000004D50000-0x0000000004D85000-memory.dmp

        Filesize

        212KB

      • memory/4812-986-0x0000000009D00000-0x000000000A318000-memory.dmp

        Filesize

        6.1MB

      • memory/4812-987-0x00000000073A0000-0x00000000073B2000-memory.dmp

        Filesize

        72KB

      • memory/4812-988-0x000000000A320000-0x000000000A42A000-memory.dmp

        Filesize

        1.0MB

      • memory/4812-989-0x000000000A440000-0x000000000A47C000-memory.dmp

        Filesize

        240KB

      • memory/4812-990-0x00000000073C0000-0x00000000073D0000-memory.dmp

        Filesize

        64KB

      • memory/4812-991-0x000000000A740000-0x000000000A7A6000-memory.dmp

        Filesize

        408KB

      • memory/4812-992-0x000000000AE10000-0x000000000AEA2000-memory.dmp

        Filesize

        584KB

      • memory/4812-993-0x000000000AEB0000-0x000000000AF00000-memory.dmp

        Filesize

        320KB

      • memory/4812-994-0x000000000AF20000-0x000000000AF96000-memory.dmp

        Filesize

        472KB

      • memory/4812-192-0x0000000004D50000-0x0000000004D85000-memory.dmp

        Filesize

        212KB

      • memory/4812-995-0x000000000B0F0000-0x000000000B2B2000-memory.dmp

        Filesize

        1.8MB

      • memory/4812-996-0x000000000B310000-0x000000000B83C000-memory.dmp

        Filesize

        5.2MB

      • memory/4812-997-0x000000000B910000-0x000000000B92E000-memory.dmp

        Filesize

        120KB