Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 00:18
Static task
static1
Behavioral task
behavioral1
Sample
2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe
Resource
win10v2004-20220901-en
General
-
Target
2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe
-
Size
388KB
-
MD5
06f6af66117fc1e8dba04c463e2c26de
-
SHA1
c0587a3dc450fcf0b18410393e6df39959871225
-
SHA256
2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493
-
SHA512
0646306cc83bb5643d4c453e4b5c52dd9e975a5b366b9e1b0548cd88058c970546a3052a6581c69ce46dd1dd6d99fd26d7ccc24a4535755ab17abfd8b7cc3796
-
SSDEEP
6144:xLfiXmF/gL6nBCP4xYlY6sUGHo4Kr+zT0dieCgdfSXC72gWHswakM/:x7/VgWnBCPflsKr+z2j2gWMw
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000C7881B4EB2331.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 936 F4D55F6500014973000C7881B4EB2331.exe -
Deletes itself 1 IoCs
pid Process 936 F4D55F6500014973000C7881B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 1104 2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe 1104 2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000C7881B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000C7881B4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000C7881B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000C7881B4EB2331.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\F4D55F6500014973000C7881B4EB2331 = "C:\\ProgramData\\F4D55F6500014973000C7881B4EB2331\\F4D55F6500014973000C7881B4EB2331.exe" F4D55F6500014973000C7881B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1104 2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe 1104 2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe 1104 2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe 1104 2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe 1104 2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe 1104 2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe 1104 2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 936 F4D55F6500014973000C7881B4EB2331.exe 936 F4D55F6500014973000C7881B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1104 wrote to memory of 936 1104 2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe 27 PID 1104 wrote to memory of 936 1104 2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe 27 PID 1104 wrote to memory of 936 1104 2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe 27 PID 1104 wrote to memory of 936 1104 2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe"C:\Users\Admin\AppData\Local\Temp\2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\ProgramData\F4D55F6500014973000C7881B4EB2331\F4D55F6500014973000C7881B4EB2331.exe"C:\ProgramData\F4D55F6500014973000C7881B4EB2331\F4D55F6500014973000C7881B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\2e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493.exe"2⤵
- Windows security bypass
- Executes dropped EXE
- Deletes itself
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:936
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD506f6af66117fc1e8dba04c463e2c26de
SHA1c0587a3dc450fcf0b18410393e6df39959871225
SHA2562e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493
SHA5120646306cc83bb5643d4c453e4b5c52dd9e975a5b366b9e1b0548cd88058c970546a3052a6581c69ce46dd1dd6d99fd26d7ccc24a4535755ab17abfd8b7cc3796
-
Filesize
388KB
MD506f6af66117fc1e8dba04c463e2c26de
SHA1c0587a3dc450fcf0b18410393e6df39959871225
SHA2562e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493
SHA5120646306cc83bb5643d4c453e4b5c52dd9e975a5b366b9e1b0548cd88058c970546a3052a6581c69ce46dd1dd6d99fd26d7ccc24a4535755ab17abfd8b7cc3796
-
Filesize
388KB
MD506f6af66117fc1e8dba04c463e2c26de
SHA1c0587a3dc450fcf0b18410393e6df39959871225
SHA2562e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493
SHA5120646306cc83bb5643d4c453e4b5c52dd9e975a5b366b9e1b0548cd88058c970546a3052a6581c69ce46dd1dd6d99fd26d7ccc24a4535755ab17abfd8b7cc3796
-
Filesize
388KB
MD506f6af66117fc1e8dba04c463e2c26de
SHA1c0587a3dc450fcf0b18410393e6df39959871225
SHA2562e52a75a5e392936e44c05e6807054f8af35c18c1328511309515f07d7b3b493
SHA5120646306cc83bb5643d4c453e4b5c52dd9e975a5b366b9e1b0548cd88058c970546a3052a6581c69ce46dd1dd6d99fd26d7ccc24a4535755ab17abfd8b7cc3796