Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
90s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
04/05/2023, 12:53
Static task
static1
General
-
Target
38e22800a6be2449a17420b848e183b881f36f00bdc758f6a11b0b10f9e6e9b2.exe
-
Size
1.5MB
-
MD5
b52a6a67f7ce03b411992b6e8f908964
-
SHA1
d58803c0be76c42a411adb5ba03990867abdf9c5
-
SHA256
38e22800a6be2449a17420b848e183b881f36f00bdc758f6a11b0b10f9e6e9b2
-
SHA512
7badb3ebae35e624a657b269586aa08f5365957297d03e2b13cb88b6521ee30ad7d86d49d9454f93d41491af5e021767051eccabae5bac988b1b8dc375e49227
-
SSDEEP
49152:9lrebYOMmBqKWSbk9DmV0TiNP+ETMpuvZ:ebYNYq649DAP+EIpuvZ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8803488.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8803488.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8803488.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8803488.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8803488.exe -
Executes dropped EXE 7 IoCs
pid Process 1600 v8512697.exe 1860 v4635441.exe 964 v8638816.exe 2348 v5360368.exe 4300 a8803488.exe 2420 b3303119.exe 3792 c5478432.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8803488.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8803488.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8512697.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4635441.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4635441.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8638816.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 38e22800a6be2449a17420b848e183b881f36f00bdc758f6a11b0b10f9e6e9b2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 38e22800a6be2449a17420b848e183b881f36f00bdc758f6a11b0b10f9e6e9b2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8512697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v8638816.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5360368.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v5360368.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
pid pid_target Process procid_target 2248 3792 WerFault.exe 73 3044 3792 WerFault.exe 73 3504 3792 WerFault.exe 73 4664 3792 WerFault.exe 73 4660 3792 WerFault.exe 73 516 3792 WerFault.exe 73 4320 3792 WerFault.exe 73 2168 3792 WerFault.exe 73 3544 3792 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4300 a8803488.exe 4300 a8803488.exe 2420 b3303119.exe 2420 b3303119.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4300 a8803488.exe Token: SeDebugPrivilege 2420 b3303119.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1600 1444 38e22800a6be2449a17420b848e183b881f36f00bdc758f6a11b0b10f9e6e9b2.exe 66 PID 1444 wrote to memory of 1600 1444 38e22800a6be2449a17420b848e183b881f36f00bdc758f6a11b0b10f9e6e9b2.exe 66 PID 1444 wrote to memory of 1600 1444 38e22800a6be2449a17420b848e183b881f36f00bdc758f6a11b0b10f9e6e9b2.exe 66 PID 1600 wrote to memory of 1860 1600 v8512697.exe 67 PID 1600 wrote to memory of 1860 1600 v8512697.exe 67 PID 1600 wrote to memory of 1860 1600 v8512697.exe 67 PID 1860 wrote to memory of 964 1860 v4635441.exe 68 PID 1860 wrote to memory of 964 1860 v4635441.exe 68 PID 1860 wrote to memory of 964 1860 v4635441.exe 68 PID 964 wrote to memory of 2348 964 v8638816.exe 69 PID 964 wrote to memory of 2348 964 v8638816.exe 69 PID 964 wrote to memory of 2348 964 v8638816.exe 69 PID 2348 wrote to memory of 4300 2348 v5360368.exe 70 PID 2348 wrote to memory of 4300 2348 v5360368.exe 70 PID 2348 wrote to memory of 4300 2348 v5360368.exe 70 PID 2348 wrote to memory of 2420 2348 v5360368.exe 71 PID 2348 wrote to memory of 2420 2348 v5360368.exe 71 PID 2348 wrote to memory of 2420 2348 v5360368.exe 71 PID 964 wrote to memory of 3792 964 v8638816.exe 73 PID 964 wrote to memory of 3792 964 v8638816.exe 73 PID 964 wrote to memory of 3792 964 v8638816.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\38e22800a6be2449a17420b848e183b881f36f00bdc758f6a11b0b10f9e6e9b2.exe"C:\Users\Admin\AppData\Local\Temp\38e22800a6be2449a17420b848e183b881f36f00bdc758f6a11b0b10f9e6e9b2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8512697.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8512697.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4635441.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4635441.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8638816.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8638816.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5360368.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5360368.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8803488.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8803488.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3303119.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3303119.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5478432.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5478432.exe5⤵
- Executes dropped EXE
PID:3792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 6206⤵
- Program crash
PID:2248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 7006⤵
- Program crash
PID:3044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 8366⤵
- Program crash
PID:3504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 8486⤵
- Program crash
PID:4664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 8766⤵
- Program crash
PID:4660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 8926⤵
- Program crash
PID:516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 11206⤵
- Program crash
PID:4320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 11526⤵
- Program crash
PID:2168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 11606⤵
- Program crash
PID:3544
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5d9eb50aaf4d5e0067536a0e75cda1fff
SHA1895cbe2b34f74f070e4621de1a9d12cf5f3582d0
SHA2560be3c77737e4a138dc46e78b4f9ec3d7a25beb654f78d1bcf79a209081a1bc8a
SHA51213664e452ea66dff875807e9322e7e1a55eb083776622a97b428542483c15a5b6a09bf1c2749fb8d3b8fde0c9da5c5190c656cd6a52d832c6f458bed218a4792
-
Filesize
1.4MB
MD5d9eb50aaf4d5e0067536a0e75cda1fff
SHA1895cbe2b34f74f070e4621de1a9d12cf5f3582d0
SHA2560be3c77737e4a138dc46e78b4f9ec3d7a25beb654f78d1bcf79a209081a1bc8a
SHA51213664e452ea66dff875807e9322e7e1a55eb083776622a97b428542483c15a5b6a09bf1c2749fb8d3b8fde0c9da5c5190c656cd6a52d832c6f458bed218a4792
-
Filesize
912KB
MD500e1841e17fde4962bf15e58b647d58d
SHA150743604fb450f6c8af77d0d1536811010e5dcfa
SHA25621a90d3235b4c004949279a670e4d10ed495c1feb19c925d76ab3f85df721dfc
SHA51280126f2523e11d04f29423de4a2f58018f88ce96ecc00d778b30151630a87357aec1614a1e0042ec23b006454680e7c653032718044894031642861f0bd9568d
-
Filesize
912KB
MD500e1841e17fde4962bf15e58b647d58d
SHA150743604fb450f6c8af77d0d1536811010e5dcfa
SHA25621a90d3235b4c004949279a670e4d10ed495c1feb19c925d76ab3f85df721dfc
SHA51280126f2523e11d04f29423de4a2f58018f88ce96ecc00d778b30151630a87357aec1614a1e0042ec23b006454680e7c653032718044894031642861f0bd9568d
-
Filesize
708KB
MD57dd3f1bccacd2446f08bebeed0106e9f
SHA1a451aeb94a0c18d489994fea567550c3d6a44754
SHA256c1b124e75047af187128caeadefa3daf3eb3f6f84b79e1ebdb93333667899ab6
SHA51268b51c73722ff43d17320c7f6fbb9c767bf51916875c659678bc856ec6727b4569671170abd76a34df94b5a320790a4ff144399c103d8d92fd490ddba7199dc2
-
Filesize
708KB
MD57dd3f1bccacd2446f08bebeed0106e9f
SHA1a451aeb94a0c18d489994fea567550c3d6a44754
SHA256c1b124e75047af187128caeadefa3daf3eb3f6f84b79e1ebdb93333667899ab6
SHA51268b51c73722ff43d17320c7f6fbb9c767bf51916875c659678bc856ec6727b4569671170abd76a34df94b5a320790a4ff144399c103d8d92fd490ddba7199dc2
-
Filesize
340KB
MD54fa29927874dba448cc63ffe96c6469c
SHA17efa9e0a6863212f42ba0a11656b2557f0d95579
SHA256d674f0c13c7ec20b275511e9cce185c33b975602bc464b4e8cbca541af3812a6
SHA5123819a1b220e1e8570c22201bbeee29d610be482c9572ec65910f07763ec5667dc32644573faa56fc8a10e6a1113febff67e8b6ee12ecee4ca6684d49d167e848
-
Filesize
340KB
MD54fa29927874dba448cc63ffe96c6469c
SHA17efa9e0a6863212f42ba0a11656b2557f0d95579
SHA256d674f0c13c7ec20b275511e9cce185c33b975602bc464b4e8cbca541af3812a6
SHA5123819a1b220e1e8570c22201bbeee29d610be482c9572ec65910f07763ec5667dc32644573faa56fc8a10e6a1113febff67e8b6ee12ecee4ca6684d49d167e848
-
Filesize
417KB
MD57a1d8c70f676eef646fd09dc8eaef62d
SHA14fa3ccec1256bab67d2ab5f6c0a3c38c8c2bc8b6
SHA2565115177d0995adfccb45b891d7a43233398be1227573922198665aa5e5dc90c8
SHA512b0130cc03296f6d36ce2fcf241ab823d373c44909981e5fface9757e2fd50a4f15c0a092f3fee9a3a7779816107545574150d91b009b8a9fc056ec61bdfe05a4
-
Filesize
417KB
MD57a1d8c70f676eef646fd09dc8eaef62d
SHA14fa3ccec1256bab67d2ab5f6c0a3c38c8c2bc8b6
SHA2565115177d0995adfccb45b891d7a43233398be1227573922198665aa5e5dc90c8
SHA512b0130cc03296f6d36ce2fcf241ab823d373c44909981e5fface9757e2fd50a4f15c0a092f3fee9a3a7779816107545574150d91b009b8a9fc056ec61bdfe05a4
-
Filesize
360KB
MD5b972452c3b6afeabb2f15ab1fad4ce9c
SHA1c0513bc818f9b4e833894ac73a35cb8a3804972a
SHA2568f1f5edb30ec8df84064ed66bea6f40720681cf552caf88d8898ab8fa242d9f3
SHA51235bd4eda5bd42e9451fb215eab040e986895cc295541afbb06a3d906fe4c4d7a8fb34b72dce480728f6e5bf85e3a79bc52b53de7fcf2783534ff42cc67519f99
-
Filesize
360KB
MD5b972452c3b6afeabb2f15ab1fad4ce9c
SHA1c0513bc818f9b4e833894ac73a35cb8a3804972a
SHA2568f1f5edb30ec8df84064ed66bea6f40720681cf552caf88d8898ab8fa242d9f3
SHA51235bd4eda5bd42e9451fb215eab040e986895cc295541afbb06a3d906fe4c4d7a8fb34b72dce480728f6e5bf85e3a79bc52b53de7fcf2783534ff42cc67519f99
-
Filesize
136KB
MD5c46e91914b575624ca8fe326c55e8f8d
SHA13dfd4f238e724a2ae4d7be36200ce00e1bb17f34
SHA2564a01a67470db00137457b1f292d2d15dcb5c01ec0bbcd147fa0674c302a6ab67
SHA512579606f7663d2ee61c6085d7df38185e52c12364bc1dd174f1e127c8deb525bb82c9acf4c1ae1f2da76921eb802a565fb826e4ea6ff4e9b3f2d4f283acddc0d4
-
Filesize
136KB
MD5c46e91914b575624ca8fe326c55e8f8d
SHA13dfd4f238e724a2ae4d7be36200ce00e1bb17f34
SHA2564a01a67470db00137457b1f292d2d15dcb5c01ec0bbcd147fa0674c302a6ab67
SHA512579606f7663d2ee61c6085d7df38185e52c12364bc1dd174f1e127c8deb525bb82c9acf4c1ae1f2da76921eb802a565fb826e4ea6ff4e9b3f2d4f283acddc0d4