Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    48s
  • max time network
    60s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26/04/2023, 19:31

General

  • Target

    107eb97721a9e794b2165807154213b02a59309b6dd152062b9ade493f7878fb.exe

  • Size

    690KB

  • MD5

    86244b0c111c78e78003db951b64660e

  • SHA1

    03290f5cd8e47d877c684e9434e7a2dd66e0055a

  • SHA256

    107eb97721a9e794b2165807154213b02a59309b6dd152062b9ade493f7878fb

  • SHA512

    f2def6b542a2deec5f2b2d0627d86f1bf75ac0a4d883b21e841a7da6caba715bcaa129f77bd60d5961f49644116f8021a7c8f06d98d0dc90b95ef0a448ac5d5f

  • SSDEEP

    12288:gy90qublJjrM90ejI2NepAcYagnGeghG1niNtm7bODhet+:gyIHrA+HYagnGeSNMON8+

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\107eb97721a9e794b2165807154213b02a59309b6dd152062b9ade493f7878fb.exe
    "C:\Users\Admin\AppData\Local\Temp\107eb97721a9e794b2165807154213b02a59309b6dd152062b9ade493f7878fb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un337891.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un337891.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\30814448.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\30814448.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4928
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk996845.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk996845.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2708
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si893662.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si893662.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3804

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si893662.exe

    Filesize

    136KB

    MD5

    e1c805d3cefe221689da30b8a2d944f2

    SHA1

    a9a94fd89ed22c2a127c81f6e57f822eae1d9f26

    SHA256

    32023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a

    SHA512

    7801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si893662.exe

    Filesize

    136KB

    MD5

    e1c805d3cefe221689da30b8a2d944f2

    SHA1

    a9a94fd89ed22c2a127c81f6e57f822eae1d9f26

    SHA256

    32023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a

    SHA512

    7801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un337891.exe

    Filesize

    536KB

    MD5

    44ffe560c43334e177151e12eb5f996e

    SHA1

    21ac8603e25ac13e77e66744d68d384a1b15b878

    SHA256

    55fe79d251f1bb5ad4ba108ed1ee38722c28f08ab48527b759aee9cc637df484

    SHA512

    79d4cb879d388a18720995abdefe6fa89f2893d7e968b2c26deeefae6e239e2f965c6a7324953f49a30a4551e958330930120459148261423598192326887c4d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un337891.exe

    Filesize

    536KB

    MD5

    44ffe560c43334e177151e12eb5f996e

    SHA1

    21ac8603e25ac13e77e66744d68d384a1b15b878

    SHA256

    55fe79d251f1bb5ad4ba108ed1ee38722c28f08ab48527b759aee9cc637df484

    SHA512

    79d4cb879d388a18720995abdefe6fa89f2893d7e968b2c26deeefae6e239e2f965c6a7324953f49a30a4551e958330930120459148261423598192326887c4d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\30814448.exe

    Filesize

    258KB

    MD5

    b51b733e2d6583673adce95ea8f1f65c

    SHA1

    c471b8da0115d01e9180deb6cb521d825cdcc5b1

    SHA256

    51f353c272f6a25c40dda473b60ccbb0ee19320ec3b17a86ae8ff7d89803e94a

    SHA512

    d8fa2bc0bda23520d69f3dbaa6c263201c3928e2fe879ad3fadc44097721c15b082b805fd7e0d2b03ac8eabee9de45e9ee47f0ae0a5db8e9d81927d9cbf40dd5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\30814448.exe

    Filesize

    258KB

    MD5

    b51b733e2d6583673adce95ea8f1f65c

    SHA1

    c471b8da0115d01e9180deb6cb521d825cdcc5b1

    SHA256

    51f353c272f6a25c40dda473b60ccbb0ee19320ec3b17a86ae8ff7d89803e94a

    SHA512

    d8fa2bc0bda23520d69f3dbaa6c263201c3928e2fe879ad3fadc44097721c15b082b805fd7e0d2b03ac8eabee9de45e9ee47f0ae0a5db8e9d81927d9cbf40dd5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk996845.exe

    Filesize

    341KB

    MD5

    de3ab3ff2ccc7391e54c2aeda180ff69

    SHA1

    ddac9b86a03af865ea04b8cae589f8e331d2bfb9

    SHA256

    b99c8e3874a418fe9c46f066928b8b5a9206f6f4c44f114b8df7c39f956ac5f5

    SHA512

    345e1f4261f43048b11e4982f34e3e96a96dd4cd312831cbf45878b1d61abc01e3afc95ee1edc810172609b72a3d8f3e7e4d844faba302e4199ff46f3d6a4fca

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk996845.exe

    Filesize

    341KB

    MD5

    de3ab3ff2ccc7391e54c2aeda180ff69

    SHA1

    ddac9b86a03af865ea04b8cae589f8e331d2bfb9

    SHA256

    b99c8e3874a418fe9c46f066928b8b5a9206f6f4c44f114b8df7c39f956ac5f5

    SHA512

    345e1f4261f43048b11e4982f34e3e96a96dd4cd312831cbf45878b1d61abc01e3afc95ee1edc810172609b72a3d8f3e7e4d844faba302e4199ff46f3d6a4fca

  • memory/2708-218-0x00000000024C0000-0x00000000024F5000-memory.dmp

    Filesize

    212KB

  • memory/2708-979-0x0000000007BB0000-0x00000000081B6000-memory.dmp

    Filesize

    6.0MB

  • memory/2708-206-0x00000000024C0000-0x00000000024F5000-memory.dmp

    Filesize

    212KB

  • memory/2708-204-0x00000000024C0000-0x00000000024F5000-memory.dmp

    Filesize

    212KB

  • memory/2708-202-0x00000000024C0000-0x00000000024F5000-memory.dmp

    Filesize

    212KB

  • memory/2708-992-0x0000000002310000-0x0000000002360000-memory.dmp

    Filesize

    320KB

  • memory/2708-990-0x0000000009080000-0x000000000909E000-memory.dmp

    Filesize

    120KB

  • memory/2708-989-0x0000000008A30000-0x0000000008F5C000-memory.dmp

    Filesize

    5.2MB

  • memory/2708-988-0x0000000008850000-0x0000000008A12000-memory.dmp

    Filesize

    1.8MB

  • memory/2708-987-0x0000000008790000-0x0000000008806000-memory.dmp

    Filesize

    472KB

  • memory/2708-986-0x00000000085F0000-0x0000000008682000-memory.dmp

    Filesize

    584KB

  • memory/2708-985-0x0000000007900000-0x0000000007966000-memory.dmp

    Filesize

    408KB

  • memory/2708-984-0x00000000077B0000-0x00000000077FB000-memory.dmp

    Filesize

    300KB

  • memory/2708-983-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/2708-982-0x0000000004C50000-0x0000000004C8E000-memory.dmp

    Filesize

    248KB

  • memory/2708-981-0x00000000075A0000-0x00000000076AA000-memory.dmp

    Filesize

    1.0MB

  • memory/2708-192-0x00000000024C0000-0x00000000024F5000-memory.dmp

    Filesize

    212KB

  • memory/2708-194-0x00000000024C0000-0x00000000024F5000-memory.dmp

    Filesize

    212KB

  • memory/2708-980-0x0000000004C20000-0x0000000004C32000-memory.dmp

    Filesize

    72KB

  • memory/2708-209-0x00000000004D0000-0x0000000000516000-memory.dmp

    Filesize

    280KB

  • memory/2708-220-0x00000000024C0000-0x00000000024F5000-memory.dmp

    Filesize

    212KB

  • memory/2708-216-0x00000000024C0000-0x00000000024F5000-memory.dmp

    Filesize

    212KB

  • memory/2708-215-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/2708-212-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/2708-213-0x00000000024C0000-0x00000000024F5000-memory.dmp

    Filesize

    212KB

  • memory/2708-181-0x0000000002150000-0x000000000218C000-memory.dmp

    Filesize

    240KB

  • memory/2708-182-0x00000000024C0000-0x00000000024FA000-memory.dmp

    Filesize

    232KB

  • memory/2708-183-0x00000000024C0000-0x00000000024F5000-memory.dmp

    Filesize

    212KB

  • memory/2708-184-0x00000000024C0000-0x00000000024F5000-memory.dmp

    Filesize

    212KB

  • memory/2708-186-0x00000000024C0000-0x00000000024F5000-memory.dmp

    Filesize

    212KB

  • memory/2708-188-0x00000000024C0000-0x00000000024F5000-memory.dmp

    Filesize

    212KB

  • memory/2708-190-0x00000000024C0000-0x00000000024F5000-memory.dmp

    Filesize

    212KB

  • memory/2708-211-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/2708-196-0x00000000024C0000-0x00000000024F5000-memory.dmp

    Filesize

    212KB

  • memory/2708-208-0x00000000024C0000-0x00000000024F5000-memory.dmp

    Filesize

    212KB

  • memory/2708-198-0x00000000024C0000-0x00000000024F5000-memory.dmp

    Filesize

    212KB

  • memory/2708-200-0x00000000024C0000-0x00000000024F5000-memory.dmp

    Filesize

    212KB

  • memory/3804-998-0x0000000000910000-0x0000000000938000-memory.dmp

    Filesize

    160KB

  • memory/3804-999-0x0000000002B90000-0x0000000002BA0000-memory.dmp

    Filesize

    64KB

  • memory/3804-1000-0x00000000076A0000-0x00000000076EB000-memory.dmp

    Filesize

    300KB

  • memory/4928-168-0x0000000002420000-0x0000000002433000-memory.dmp

    Filesize

    76KB

  • memory/4928-170-0x0000000002420000-0x0000000002433000-memory.dmp

    Filesize

    76KB

  • memory/4928-141-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/4928-139-0x0000000002420000-0x0000000002438000-memory.dmp

    Filesize

    96KB

  • memory/4928-140-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/4928-176-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/4928-138-0x0000000004C70000-0x000000000516E000-memory.dmp

    Filesize

    5.0MB

  • memory/4928-174-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/4928-173-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/4928-172-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/4928-171-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/4928-166-0x0000000002420000-0x0000000002433000-memory.dmp

    Filesize

    76KB

  • memory/4928-164-0x0000000002420000-0x0000000002433000-memory.dmp

    Filesize

    76KB

  • memory/4928-162-0x0000000002420000-0x0000000002433000-memory.dmp

    Filesize

    76KB

  • memory/4928-160-0x0000000002420000-0x0000000002433000-memory.dmp

    Filesize

    76KB

  • memory/4928-158-0x0000000002420000-0x0000000002433000-memory.dmp

    Filesize

    76KB

  • memory/4928-156-0x0000000002420000-0x0000000002433000-memory.dmp

    Filesize

    76KB

  • memory/4928-154-0x0000000002420000-0x0000000002433000-memory.dmp

    Filesize

    76KB

  • memory/4928-152-0x0000000002420000-0x0000000002433000-memory.dmp

    Filesize

    76KB

  • memory/4928-150-0x0000000002420000-0x0000000002433000-memory.dmp

    Filesize

    76KB

  • memory/4928-148-0x0000000002420000-0x0000000002433000-memory.dmp

    Filesize

    76KB

  • memory/4928-146-0x0000000002420000-0x0000000002433000-memory.dmp

    Filesize

    76KB

  • memory/4928-137-0x0000000002060000-0x000000000207A000-memory.dmp

    Filesize

    104KB

  • memory/4928-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4928-144-0x0000000002420000-0x0000000002433000-memory.dmp

    Filesize

    76KB

  • memory/4928-143-0x0000000002420000-0x0000000002433000-memory.dmp

    Filesize

    76KB

  • memory/4928-142-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB