Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    90s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04/05/2023, 12:53

General

  • Target

    38e22800a6be2449a17420b848e183b881f36f00bdc758f6a11b0b10f9e6e9b2.exe

  • Size

    1.5MB

  • MD5

    b52a6a67f7ce03b411992b6e8f908964

  • SHA1

    d58803c0be76c42a411adb5ba03990867abdf9c5

  • SHA256

    38e22800a6be2449a17420b848e183b881f36f00bdc758f6a11b0b10f9e6e9b2

  • SHA512

    7badb3ebae35e624a657b269586aa08f5365957297d03e2b13cb88b6521ee30ad7d86d49d9454f93d41491af5e021767051eccabae5bac988b1b8dc375e49227

  • SSDEEP

    49152:9lrebYOMmBqKWSbk9DmV0TiNP+ETMpuvZ:ebYNYq649DAP+EIpuvZ

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38e22800a6be2449a17420b848e183b881f36f00bdc758f6a11b0b10f9e6e9b2.exe
    "C:\Users\Admin\AppData\Local\Temp\38e22800a6be2449a17420b848e183b881f36f00bdc758f6a11b0b10f9e6e9b2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8512697.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8512697.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4635441.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4635441.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1860
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8638816.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8638816.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:964
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5360368.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5360368.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2348
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8803488.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8803488.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4300
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3303119.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3303119.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2420
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5478432.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5478432.exe
            5⤵
            • Executes dropped EXE
            PID:3792
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 620
              6⤵
              • Program crash
              PID:2248
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 700
              6⤵
              • Program crash
              PID:3044
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 836
              6⤵
              • Program crash
              PID:3504
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 848
              6⤵
              • Program crash
              PID:4664
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 876
              6⤵
              • Program crash
              PID:4660
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 892
              6⤵
              • Program crash
              PID:516
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 1120
              6⤵
              • Program crash
              PID:4320
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 1152
              6⤵
              • Program crash
              PID:2168
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 1160
              6⤵
              • Program crash
              PID:3544

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8512697.exe

    Filesize

    1.4MB

    MD5

    d9eb50aaf4d5e0067536a0e75cda1fff

    SHA1

    895cbe2b34f74f070e4621de1a9d12cf5f3582d0

    SHA256

    0be3c77737e4a138dc46e78b4f9ec3d7a25beb654f78d1bcf79a209081a1bc8a

    SHA512

    13664e452ea66dff875807e9322e7e1a55eb083776622a97b428542483c15a5b6a09bf1c2749fb8d3b8fde0c9da5c5190c656cd6a52d832c6f458bed218a4792

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8512697.exe

    Filesize

    1.4MB

    MD5

    d9eb50aaf4d5e0067536a0e75cda1fff

    SHA1

    895cbe2b34f74f070e4621de1a9d12cf5f3582d0

    SHA256

    0be3c77737e4a138dc46e78b4f9ec3d7a25beb654f78d1bcf79a209081a1bc8a

    SHA512

    13664e452ea66dff875807e9322e7e1a55eb083776622a97b428542483c15a5b6a09bf1c2749fb8d3b8fde0c9da5c5190c656cd6a52d832c6f458bed218a4792

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4635441.exe

    Filesize

    912KB

    MD5

    00e1841e17fde4962bf15e58b647d58d

    SHA1

    50743604fb450f6c8af77d0d1536811010e5dcfa

    SHA256

    21a90d3235b4c004949279a670e4d10ed495c1feb19c925d76ab3f85df721dfc

    SHA512

    80126f2523e11d04f29423de4a2f58018f88ce96ecc00d778b30151630a87357aec1614a1e0042ec23b006454680e7c653032718044894031642861f0bd9568d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4635441.exe

    Filesize

    912KB

    MD5

    00e1841e17fde4962bf15e58b647d58d

    SHA1

    50743604fb450f6c8af77d0d1536811010e5dcfa

    SHA256

    21a90d3235b4c004949279a670e4d10ed495c1feb19c925d76ab3f85df721dfc

    SHA512

    80126f2523e11d04f29423de4a2f58018f88ce96ecc00d778b30151630a87357aec1614a1e0042ec23b006454680e7c653032718044894031642861f0bd9568d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8638816.exe

    Filesize

    708KB

    MD5

    7dd3f1bccacd2446f08bebeed0106e9f

    SHA1

    a451aeb94a0c18d489994fea567550c3d6a44754

    SHA256

    c1b124e75047af187128caeadefa3daf3eb3f6f84b79e1ebdb93333667899ab6

    SHA512

    68b51c73722ff43d17320c7f6fbb9c767bf51916875c659678bc856ec6727b4569671170abd76a34df94b5a320790a4ff144399c103d8d92fd490ddba7199dc2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8638816.exe

    Filesize

    708KB

    MD5

    7dd3f1bccacd2446f08bebeed0106e9f

    SHA1

    a451aeb94a0c18d489994fea567550c3d6a44754

    SHA256

    c1b124e75047af187128caeadefa3daf3eb3f6f84b79e1ebdb93333667899ab6

    SHA512

    68b51c73722ff43d17320c7f6fbb9c767bf51916875c659678bc856ec6727b4569671170abd76a34df94b5a320790a4ff144399c103d8d92fd490ddba7199dc2

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5478432.exe

    Filesize

    340KB

    MD5

    4fa29927874dba448cc63ffe96c6469c

    SHA1

    7efa9e0a6863212f42ba0a11656b2557f0d95579

    SHA256

    d674f0c13c7ec20b275511e9cce185c33b975602bc464b4e8cbca541af3812a6

    SHA512

    3819a1b220e1e8570c22201bbeee29d610be482c9572ec65910f07763ec5667dc32644573faa56fc8a10e6a1113febff67e8b6ee12ecee4ca6684d49d167e848

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5478432.exe

    Filesize

    340KB

    MD5

    4fa29927874dba448cc63ffe96c6469c

    SHA1

    7efa9e0a6863212f42ba0a11656b2557f0d95579

    SHA256

    d674f0c13c7ec20b275511e9cce185c33b975602bc464b4e8cbca541af3812a6

    SHA512

    3819a1b220e1e8570c22201bbeee29d610be482c9572ec65910f07763ec5667dc32644573faa56fc8a10e6a1113febff67e8b6ee12ecee4ca6684d49d167e848

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5360368.exe

    Filesize

    417KB

    MD5

    7a1d8c70f676eef646fd09dc8eaef62d

    SHA1

    4fa3ccec1256bab67d2ab5f6c0a3c38c8c2bc8b6

    SHA256

    5115177d0995adfccb45b891d7a43233398be1227573922198665aa5e5dc90c8

    SHA512

    b0130cc03296f6d36ce2fcf241ab823d373c44909981e5fface9757e2fd50a4f15c0a092f3fee9a3a7779816107545574150d91b009b8a9fc056ec61bdfe05a4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5360368.exe

    Filesize

    417KB

    MD5

    7a1d8c70f676eef646fd09dc8eaef62d

    SHA1

    4fa3ccec1256bab67d2ab5f6c0a3c38c8c2bc8b6

    SHA256

    5115177d0995adfccb45b891d7a43233398be1227573922198665aa5e5dc90c8

    SHA512

    b0130cc03296f6d36ce2fcf241ab823d373c44909981e5fface9757e2fd50a4f15c0a092f3fee9a3a7779816107545574150d91b009b8a9fc056ec61bdfe05a4

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8803488.exe

    Filesize

    360KB

    MD5

    b972452c3b6afeabb2f15ab1fad4ce9c

    SHA1

    c0513bc818f9b4e833894ac73a35cb8a3804972a

    SHA256

    8f1f5edb30ec8df84064ed66bea6f40720681cf552caf88d8898ab8fa242d9f3

    SHA512

    35bd4eda5bd42e9451fb215eab040e986895cc295541afbb06a3d906fe4c4d7a8fb34b72dce480728f6e5bf85e3a79bc52b53de7fcf2783534ff42cc67519f99

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8803488.exe

    Filesize

    360KB

    MD5

    b972452c3b6afeabb2f15ab1fad4ce9c

    SHA1

    c0513bc818f9b4e833894ac73a35cb8a3804972a

    SHA256

    8f1f5edb30ec8df84064ed66bea6f40720681cf552caf88d8898ab8fa242d9f3

    SHA512

    35bd4eda5bd42e9451fb215eab040e986895cc295541afbb06a3d906fe4c4d7a8fb34b72dce480728f6e5bf85e3a79bc52b53de7fcf2783534ff42cc67519f99

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3303119.exe

    Filesize

    136KB

    MD5

    c46e91914b575624ca8fe326c55e8f8d

    SHA1

    3dfd4f238e724a2ae4d7be36200ce00e1bb17f34

    SHA256

    4a01a67470db00137457b1f292d2d15dcb5c01ec0bbcd147fa0674c302a6ab67

    SHA512

    579606f7663d2ee61c6085d7df38185e52c12364bc1dd174f1e127c8deb525bb82c9acf4c1ae1f2da76921eb802a565fb826e4ea6ff4e9b3f2d4f283acddc0d4

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3303119.exe

    Filesize

    136KB

    MD5

    c46e91914b575624ca8fe326c55e8f8d

    SHA1

    3dfd4f238e724a2ae4d7be36200ce00e1bb17f34

    SHA256

    4a01a67470db00137457b1f292d2d15dcb5c01ec0bbcd147fa0674c302a6ab67

    SHA512

    579606f7663d2ee61c6085d7df38185e52c12364bc1dd174f1e127c8deb525bb82c9acf4c1ae1f2da76921eb802a565fb826e4ea6ff4e9b3f2d4f283acddc0d4

  • memory/2420-206-0x00000000083C0000-0x0000000008452000-memory.dmp

    Filesize

    584KB

  • memory/2420-205-0x0000000007850000-0x00000000078B6000-memory.dmp

    Filesize

    408KB

  • memory/2420-210-0x0000000008E90000-0x0000000009052000-memory.dmp

    Filesize

    1.8MB

  • memory/2420-209-0x00000000086D0000-0x0000000008720000-memory.dmp

    Filesize

    320KB

  • memory/2420-208-0x0000000008560000-0x000000000857E000-memory.dmp

    Filesize

    120KB

  • memory/2420-207-0x00000000085E0000-0x0000000008656000-memory.dmp

    Filesize

    472KB

  • memory/2420-198-0x0000000000760000-0x0000000000788000-memory.dmp

    Filesize

    160KB

  • memory/2420-211-0x0000000009590000-0x0000000009ABC000-memory.dmp

    Filesize

    5.2MB

  • memory/2420-204-0x00000000077D0000-0x00000000077E0000-memory.dmp

    Filesize

    64KB

  • memory/2420-203-0x00000000074E0000-0x000000000752B000-memory.dmp

    Filesize

    300KB

  • memory/2420-202-0x00000000074A0000-0x00000000074DE000-memory.dmp

    Filesize

    248KB

  • memory/2420-201-0x0000000007570000-0x000000000767A000-memory.dmp

    Filesize

    1.0MB

  • memory/2420-200-0x0000000007440000-0x0000000007452000-memory.dmp

    Filesize

    72KB

  • memory/2420-199-0x00000000079B0000-0x0000000007FB6000-memory.dmp

    Filesize

    6.0MB

  • memory/3792-218-0x0000000000400000-0x00000000006EF000-memory.dmp

    Filesize

    2.9MB

  • memory/3792-217-0x00000000007E0000-0x0000000000815000-memory.dmp

    Filesize

    212KB

  • memory/4300-160-0x0000000002750000-0x0000000002768000-memory.dmp

    Filesize

    96KB

  • memory/4300-191-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4300-192-0x0000000000400000-0x00000000006F4000-memory.dmp

    Filesize

    3.0MB

  • memory/4300-194-0x0000000000400000-0x00000000006F4000-memory.dmp

    Filesize

    3.0MB

  • memory/4300-189-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4300-187-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4300-178-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4300-185-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4300-182-0x00000000022E0000-0x00000000022F0000-memory.dmp

    Filesize

    64KB

  • memory/4300-183-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4300-179-0x00000000022E0000-0x00000000022F0000-memory.dmp

    Filesize

    64KB

  • memory/4300-181-0x00000000022E0000-0x00000000022F0000-memory.dmp

    Filesize

    64KB

  • memory/4300-176-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4300-174-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4300-172-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4300-170-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4300-168-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4300-166-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4300-164-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4300-162-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4300-161-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4300-159-0x0000000004CC0000-0x00000000051BE000-memory.dmp

    Filesize

    5.0MB

  • memory/4300-158-0x0000000002300000-0x000000000231A000-memory.dmp

    Filesize

    104KB

  • memory/4300-157-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB