Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2023, 07:46
Static task
static1
Behavioral task
behavioral1
Sample
7104f635a41839bac7835703f06f744e.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
7104f635a41839bac7835703f06f744e.exe
Resource
win10v2004-20230703-en
General
-
Target
7104f635a41839bac7835703f06f744e.exe
-
Size
95KB
-
MD5
7104f635a41839bac7835703f06f744e
-
SHA1
2ca12e1bf681180799a2f277c13218418bb9f1bb
-
SHA256
88502f27ab03c34af7ceda2bb6fecda42ae227e74e8a5e52346db749e200d134
-
SHA512
9d61715d705363073b8b6e645c462095e7bd039aa67013f7907162d7f47cc151be6bbcddd2292cdc03859327525e87ef0e0090609701a4507ea8f4715db95c7a
-
SSDEEP
1536:auj56ycNa0SNndwAhRvTlrYZUkGnP3+RBJWPnhdTW8tBniRgR:auj5+NJINhRvTHlnP3+RB4pYwBi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1960 TrRJLfmPbPyzKCdX.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\olUPnogcERyFGyiskq = "C:\\ProgramData\\TrRJLfmPbPyzKCdX.exe" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\olUPnogcERyFGyiskq = "C:\\ProgramData\\TrRJLfmPbPyzKCdX.exe" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 4800 timeout.exe 868 timeout.exe 3536 timeout.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3788 7104f635a41839bac7835703f06f744e.exe 3788 7104f635a41839bac7835703f06f744e.exe 468 powershell.exe 468 powershell.exe 1960 TrRJLfmPbPyzKCdX.exe 1960 TrRJLfmPbPyzKCdX.exe 3192 powershell.exe 3192 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 468 powershell.exe Token: SeDebugPrivilege 3192 powershell.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3788 wrote to memory of 468 3788 7104f635a41839bac7835703f06f744e.exe 84 PID 3788 wrote to memory of 468 3788 7104f635a41839bac7835703f06f744e.exe 84 PID 3788 wrote to memory of 468 3788 7104f635a41839bac7835703f06f744e.exe 84 PID 3788 wrote to memory of 4036 3788 7104f635a41839bac7835703f06f744e.exe 85 PID 3788 wrote to memory of 4036 3788 7104f635a41839bac7835703f06f744e.exe 85 PID 3788 wrote to memory of 4036 3788 7104f635a41839bac7835703f06f744e.exe 85 PID 3788 wrote to memory of 2132 3788 7104f635a41839bac7835703f06f744e.exe 86 PID 3788 wrote to memory of 2132 3788 7104f635a41839bac7835703f06f744e.exe 86 PID 3788 wrote to memory of 2132 3788 7104f635a41839bac7835703f06f744e.exe 86 PID 4036 wrote to memory of 3536 4036 cmd.exe 90 PID 4036 wrote to memory of 3536 4036 cmd.exe 90 PID 4036 wrote to memory of 3536 4036 cmd.exe 90 PID 2132 wrote to memory of 4800 2132 cmd.exe 91 PID 2132 wrote to memory of 4800 2132 cmd.exe 91 PID 2132 wrote to memory of 4800 2132 cmd.exe 91 PID 2132 wrote to memory of 1960 2132 cmd.exe 95 PID 2132 wrote to memory of 1960 2132 cmd.exe 95 PID 2132 wrote to memory of 1960 2132 cmd.exe 95 PID 1960 wrote to memory of 3192 1960 TrRJLfmPbPyzKCdX.exe 96 PID 1960 wrote to memory of 3192 1960 TrRJLfmPbPyzKCdX.exe 96 PID 1960 wrote to memory of 3192 1960 TrRJLfmPbPyzKCdX.exe 96 PID 1960 wrote to memory of 4424 1960 TrRJLfmPbPyzKCdX.exe 97 PID 1960 wrote to memory of 4424 1960 TrRJLfmPbPyzKCdX.exe 97 PID 1960 wrote to memory of 4424 1960 TrRJLfmPbPyzKCdX.exe 97 PID 4424 wrote to memory of 868 4424 cmd.exe 100 PID 4424 wrote to memory of 868 4424 cmd.exe 100 PID 4424 wrote to memory of 868 4424 cmd.exe 100 PID 4036 wrote to memory of 3812 4036 cmd.exe 104 PID 4036 wrote to memory of 3812 4036 cmd.exe 104 PID 4036 wrote to memory of 3812 4036 cmd.exe 104 PID 4424 wrote to memory of 2436 4424 cmd.exe 105 PID 4424 wrote to memory of 2436 4424 cmd.exe 105 PID 4424 wrote to memory of 2436 4424 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\7104f635a41839bac7835703f06f744e.exe"C:\Users\Admin\AppData\Local\Temp\7104f635a41839bac7835703f06f744e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -W Hidden -Exec Bypass Add-MpPreference -ExclusionPath "C:\ProgramData"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:468
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c (timeout /t 60) & (reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /reg:64 /v olUPnogcERyFGyiskq /d "C:\ProgramData\TrRJLfmPbPyzKCdX.exe")2⤵
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\timeout.exetimeout /t 603⤵
- Delays execution with timeout.exe
PID:3536
-
-
C:\Windows\SysWOW64\reg.exereg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /reg:64 /v olUPnogcERyFGyiskq /d "C:\ProgramData\TrRJLfmPbPyzKCdX.exe"3⤵
- Adds Run key to start application
PID:3812
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c (timeout /t 10) & (del /F /Q "C:\Users\Admin\AppData\Local\Temp\7104f635a41839bac7835703f06f744e.exe") & (start "" "C:\ProgramData\TrRJLfmPbPyzKCdX.exe")2⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\timeout.exetimeout /t 103⤵
- Delays execution with timeout.exe
PID:4800
-
-
C:\ProgramData\TrRJLfmPbPyzKCdX.exe"C:\ProgramData\TrRJLfmPbPyzKCdX.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -W Hidden -Exec Bypass Add-MpPreference -ExclusionPath "C:\ProgramData"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3192
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c (timeout /t 60) & (reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /reg:64 /v olUPnogcERyFGyiskq /d "C:\ProgramData\TrRJLfmPbPyzKCdX.exe")4⤵
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\timeout.exetimeout /t 605⤵
- Delays execution with timeout.exe
PID:868
-
-
C:\Windows\SysWOW64\reg.exereg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /reg:64 /v olUPnogcERyFGyiskq /d "C:\ProgramData\TrRJLfmPbPyzKCdX.exe"5⤵
- Adds Run key to start application
PID:2436
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD57104f635a41839bac7835703f06f744e
SHA12ca12e1bf681180799a2f277c13218418bb9f1bb
SHA25688502f27ab03c34af7ceda2bb6fecda42ae227e74e8a5e52346db749e200d134
SHA5129d61715d705363073b8b6e645c462095e7bd039aa67013f7907162d7f47cc151be6bbcddd2292cdc03859327525e87ef0e0090609701a4507ea8f4715db95c7a
-
Filesize
95KB
MD57104f635a41839bac7835703f06f744e
SHA12ca12e1bf681180799a2f277c13218418bb9f1bb
SHA25688502f27ab03c34af7ceda2bb6fecda42ae227e74e8a5e52346db749e200d134
SHA5129d61715d705363073b8b6e645c462095e7bd039aa67013f7907162d7f47cc151be6bbcddd2292cdc03859327525e87ef0e0090609701a4507ea8f4715db95c7a
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD56e73bf9e9aeeddae3e395279e1764e40
SHA1759e11525a966da5cb19131e49c5c70a907f2bbb
SHA2566a1290f09f8227baf61688bea914006fefe86516db115908f65c2bf05506bd82
SHA5128126f1ff1255263b2dd4e7216666d0b99aa4de0f4047ce46e215ed612ff63c2c704beaa42f28a144cef318020546bf305c65c95a3592293ee8ce0a4a217b00eb
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82