Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 14:01
Static task
static1
Behavioral task
behavioral1
Sample
23b36e8c767ba99b39d1bfb4561ba1d15e9cd7091650d31ce50f9d5ee0124f3d.exe
Resource
win7-20220901-en
General
-
Target
23b36e8c767ba99b39d1bfb4561ba1d15e9cd7091650d31ce50f9d5ee0124f3d.exe
-
Size
796KB
-
MD5
64b56af0196afe85b4c242ec3c4350c0
-
SHA1
bf6dd3b3be7d862569b941bc2ada573d8bad92da
-
SHA256
23b36e8c767ba99b39d1bfb4561ba1d15e9cd7091650d31ce50f9d5ee0124f3d
-
SHA512
47abc8c6745df75f532c771a816fb9a7514400b5ccbc61b8b628068f3e8238506e91fe2482ab5d4bf912addd492c895eb959d9243dfae808a04508f40bb8b816
-
SSDEEP
24576:fvFQaGTzzyG0eEjJPC2/rPpDRXkLBtKcy2a2N6V:lChajhpYv3a2oV
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\FirewallDisableNotify = "1" uivednejprd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\FirewallOverride = "1" uivednejprd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusDisableNotify = "1" uivednejprd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusOverride = "1" uivednejprd.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts exlzs747t2tfggcus4uw.exe -
Executes dropped EXE 5 IoCs
pid Process 2380 exlzs747t2tfggcus4uw.exe 3332 uivednejprd.exe 4252 umwullmunfiw.exe 2036 uivednejprd.exe 2576 exlzs747wbefgg.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 536 netsh.exe -
Loads dropped DLL 4 IoCs
pid Process 1600 23b36e8c767ba99b39d1bfb4561ba1d15e9cd7091650d31ce50f9d5ee0124f3d.exe 1600 23b36e8c767ba99b39d1bfb4561ba1d15e9cd7091650d31ce50f9d5ee0124f3d.exe 3332 uivednejprd.exe 3332 uivednejprd.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\FirewallDisableNotify = "1" uivednejprd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\FirewallOverride = "1" uivednejprd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusDisableNotify = "1" uivednejprd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusOverride = "1" uivednejprd.exe -
Drops file in Windows directory 22 IoCs
description ioc Process File opened for modification C:\Windows\qaejoszxsfqoj\ 23b36e8c767ba99b39d1bfb4561ba1d15e9cd7091650d31ce50f9d5ee0124f3d.exe File created C:\Windows\qaejoszxsfqoj\lck exlzs747t2tfggcus4uw.exe File opened for modification C:\Windows\qaejoszxsfqoj\lck uivednejprd.exe File opened for modification C:\Windows\umwullmunfiw.exe uivednejprd.exe File created C:\Windows\qaejoszxsfqoj\rng uivednejprd.exe File opened for modification C:\Windows\qaejoszxsfqoj\tst umwullmunfiw.exe File opened for modification C:\Windows\qaejoszxsfqoj\tst uivednejprd.exe File created C:\Windows\qaejoszxsfqoj\tst 23b36e8c767ba99b39d1bfb4561ba1d15e9cd7091650d31ce50f9d5ee0124f3d.exe File created C:\Windows\qaejoszxsfqoj\etc exlzs747t2tfggcus4uw.exe File opened for modification C:\Windows\uivednejprd.exe exlzs747t2tfggcus4uw.exe File created C:\Windows\uivednejprd.exe exlzs747t2tfggcus4uw.exe File opened for modification C:\Windows\qaejoszxsfqoj\tst uivednejprd.exe File opened for modification C:\Windows\qaejoszxsfqoj\ uivednejprd.exe File created C:\Windows\qaejoszxsfqoj\cfg uivednejprd.exe File opened for modification C:\Windows\qaejoszxsfqoj\tst exlzs747t2tfggcus4uw.exe File opened for modification C:\Windows\qaejoszxsfqoj\ exlzs747t2tfggcus4uw.exe File created C:\Windows\umwullmunfiw.exe uivednejprd.exe File opened for modification C:\Windows\qaejoszxsfqoj\rng uivednejprd.exe File created C:\Windows\qaejoszxsfqoj\run uivednejprd.exe File opened for modification C:\Windows\qaejoszxsfqoj\ umwullmunfiw.exe File opened for modification C:\Windows\qaejoszxsfqoj\ uivednejprd.exe File created C:\Windows\qaejoszxsfqoj\lck uivednejprd.exe -
Modifies data under HKEY_USERS 17 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-100 = "RD Gateway Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-103 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-100 = "EAP Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-103 = "Microsoft Corporation" netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-2 = "Provides IPsec based enforcement for Network Access Protection" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-101 = "Provides Network Access Protection enforcement for EAP authenticated network connections, such as those used with 802.1X and VPN technologies." netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-100 = "DHCP Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-101 = "Provides DHCP based enforcement for NAP" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-102 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-102 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-4 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-3 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-101 = "Provides RD Gateway enforcement for NAP" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-102 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-103 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-1 = "IPsec Relying Party" netsh.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 3332 uivednejprd.exe 4252 umwullmunfiw.exe 4252 umwullmunfiw.exe 4252 umwullmunfiw.exe 4252 umwullmunfiw.exe 4252 umwullmunfiw.exe 4252 umwullmunfiw.exe 4252 umwullmunfiw.exe 4252 umwullmunfiw.exe 4252 umwullmunfiw.exe 4252 umwullmunfiw.exe 4252 umwullmunfiw.exe 4252 umwullmunfiw.exe 4252 umwullmunfiw.exe 4252 umwullmunfiw.exe 4252 umwullmunfiw.exe 4252 umwullmunfiw.exe 4252 umwullmunfiw.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1600 wrote to memory of 2380 1600 23b36e8c767ba99b39d1bfb4561ba1d15e9cd7091650d31ce50f9d5ee0124f3d.exe 27 PID 1600 wrote to memory of 2380 1600 23b36e8c767ba99b39d1bfb4561ba1d15e9cd7091650d31ce50f9d5ee0124f3d.exe 27 PID 1600 wrote to memory of 2380 1600 23b36e8c767ba99b39d1bfb4561ba1d15e9cd7091650d31ce50f9d5ee0124f3d.exe 27 PID 1600 wrote to memory of 2380 1600 23b36e8c767ba99b39d1bfb4561ba1d15e9cd7091650d31ce50f9d5ee0124f3d.exe 27 PID 3332 wrote to memory of 4252 3332 uivednejprd.exe 29 PID 3332 wrote to memory of 4252 3332 uivednejprd.exe 29 PID 3332 wrote to memory of 4252 3332 uivednejprd.exe 29 PID 3332 wrote to memory of 4252 3332 uivednejprd.exe 29 PID 3332 wrote to memory of 536 3332 uivednejprd.exe 30 PID 3332 wrote to memory of 536 3332 uivednejprd.exe 30 PID 3332 wrote to memory of 536 3332 uivednejprd.exe 30 PID 3332 wrote to memory of 536 3332 uivednejprd.exe 30 PID 2380 wrote to memory of 2036 2380 exlzs747t2tfggcus4uw.exe 32 PID 2380 wrote to memory of 2036 2380 exlzs747t2tfggcus4uw.exe 32 PID 2380 wrote to memory of 2036 2380 exlzs747t2tfggcus4uw.exe 32 PID 2380 wrote to memory of 2036 2380 exlzs747t2tfggcus4uw.exe 32 PID 3332 wrote to memory of 2576 3332 uivednejprd.exe 33 PID 3332 wrote to memory of 2576 3332 uivednejprd.exe 33 PID 3332 wrote to memory of 2576 3332 uivednejprd.exe 33 PID 3332 wrote to memory of 2576 3332 uivednejprd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\23b36e8c767ba99b39d1bfb4561ba1d15e9cd7091650d31ce50f9d5ee0124f3d.exe"C:\Users\Admin\AppData\Local\Temp\23b36e8c767ba99b39d1bfb4561ba1d15e9cd7091650d31ce50f9d5ee0124f3d.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\exlzs747t2tfggcus4uw.exe"C:\Users\Admin\AppData\Local\Temp\exlzs747t2tfggcus4uw.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\uivednejprd.exe"C:\Windows\uivednejprd.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2036
-
-
-
C:\Windows\uivednejprd.exeC:\Windows\uivednejprd.exe1⤵
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\umwullmunfiw.exeWATCHDOGPROC "c:\windows\uivednejprd.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4252
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe firewall set opmode disable2⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:536
-
-
C:\Windows\TEMP\exlzs747wbefgg.exeC:\Windows\TEMP\exlzs747wbefgg.exe -r 26304 tcp2⤵
- Executes dropped EXE
PID:2576
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
796KB
MD5d16c0cfabc71266f819cf465c4e9f89a
SHA1990e82e9a0be40842a0bfb4bad88d20867c8f65f
SHA256e481f04a7aacc075c1ec9744f54cacb61737d57a30344763af1ec5056e93c88a
SHA5127695f658cd0ceed4a7c69f5d37c84e03ea7992219f1a028b2ceda250a6c5f913dab520348de6b661ad85d3c7067e8e4bf112348eeec9eb6aa7c562cf142a9ed4
-
Filesize
34KB
MD5476f447617f65eebf35c52d4fd3b3188
SHA1179ee6e698803a45be916f107638f01d553d6e65
SHA256a8c7fd29a25658f115213c3516dd8f77d44d42c40f9348996443e593d878dcf0
SHA51237c51cb92a2adaa3fdb70ae41c95f5499e25cc772020d6c701ef9ce157320017ae207896dcc0e27b9841d0b7890a8b37440bff6dfa0468dc01f72275d4c820f9
-
Filesize
10B
MD5f88afa0fa241403dfd98c4a821363068
SHA151222887163b34f02dc35eaffbb127940b44ec91
SHA2563ec913f1de6e549c24261b68f8623fcd609afcc301985d231414cbaa09e2b55e
SHA512e836a09cab1a5d9663da898b1a23f322dfae5244ec88282b7135b2c7fda47682cf490b0bac3a1fc7555b931bfc1f12a5892ee7dedc2c9238b45e9b86ff56814b
-
Filesize
4B
MD53bf81e2bf6dc61706efb9a6dadc5793a
SHA1bf1bbfb3b5aaddbc5065b8440ea616d84fad8ff2
SHA256961ae28829f0b1cfbd073eff070ac5ea8994618c0e84fab4764367464a14b854
SHA512354f74cb52f314226a6021c5745799d05a0c8ba21246c9717b8ce211193603c4704b72332f80576d15b14d76c8f772cd5b6fa7a10acb60fab67411573f732b1c
-
Filesize
10B
MD5d9e0d258df86c6859951b803fa0e539c
SHA1d04df79fdffa92605bdc478f4247fa2b55fceb7f
SHA256e71eb9e1b484bed5dc20e32acf079f979aec46863078331771912423e08b564e
SHA5128c0dbe178f6769dac6573afea6ad1c4b3caa2443276abbcbe6cecc4698b88174963a83ad4952966526c25548b2f266dddb800d0b778b8f76327367aa7562537e
-
Filesize
10B
MD5d9e0d258df86c6859951b803fa0e539c
SHA1d04df79fdffa92605bdc478f4247fa2b55fceb7f
SHA256e71eb9e1b484bed5dc20e32acf079f979aec46863078331771912423e08b564e
SHA5128c0dbe178f6769dac6573afea6ad1c4b3caa2443276abbcbe6cecc4698b88174963a83ad4952966526c25548b2f266dddb800d0b778b8f76327367aa7562537e
-
Filesize
10B
MD5d9e0d258df86c6859951b803fa0e539c
SHA1d04df79fdffa92605bdc478f4247fa2b55fceb7f
SHA256e71eb9e1b484bed5dc20e32acf079f979aec46863078331771912423e08b564e
SHA5128c0dbe178f6769dac6573afea6ad1c4b3caa2443276abbcbe6cecc4698b88174963a83ad4952966526c25548b2f266dddb800d0b778b8f76327367aa7562537e
-
Filesize
10B
MD5d9e0d258df86c6859951b803fa0e539c
SHA1d04df79fdffa92605bdc478f4247fa2b55fceb7f
SHA256e71eb9e1b484bed5dc20e32acf079f979aec46863078331771912423e08b564e
SHA5128c0dbe178f6769dac6573afea6ad1c4b3caa2443276abbcbe6cecc4698b88174963a83ad4952966526c25548b2f266dddb800d0b778b8f76327367aa7562537e
-
Filesize
796KB
MD5d16c0cfabc71266f819cf465c4e9f89a
SHA1990e82e9a0be40842a0bfb4bad88d20867c8f65f
SHA256e481f04a7aacc075c1ec9744f54cacb61737d57a30344763af1ec5056e93c88a
SHA5127695f658cd0ceed4a7c69f5d37c84e03ea7992219f1a028b2ceda250a6c5f913dab520348de6b661ad85d3c7067e8e4bf112348eeec9eb6aa7c562cf142a9ed4
-
Filesize
796KB
MD5d16c0cfabc71266f819cf465c4e9f89a
SHA1990e82e9a0be40842a0bfb4bad88d20867c8f65f
SHA256e481f04a7aacc075c1ec9744f54cacb61737d57a30344763af1ec5056e93c88a
SHA5127695f658cd0ceed4a7c69f5d37c84e03ea7992219f1a028b2ceda250a6c5f913dab520348de6b661ad85d3c7067e8e4bf112348eeec9eb6aa7c562cf142a9ed4
-
Filesize
796KB
MD5d16c0cfabc71266f819cf465c4e9f89a
SHA1990e82e9a0be40842a0bfb4bad88d20867c8f65f
SHA256e481f04a7aacc075c1ec9744f54cacb61737d57a30344763af1ec5056e93c88a
SHA5127695f658cd0ceed4a7c69f5d37c84e03ea7992219f1a028b2ceda250a6c5f913dab520348de6b661ad85d3c7067e8e4bf112348eeec9eb6aa7c562cf142a9ed4
-
Filesize
796KB
MD5d16c0cfabc71266f819cf465c4e9f89a
SHA1990e82e9a0be40842a0bfb4bad88d20867c8f65f
SHA256e481f04a7aacc075c1ec9744f54cacb61737d57a30344763af1ec5056e93c88a
SHA5127695f658cd0ceed4a7c69f5d37c84e03ea7992219f1a028b2ceda250a6c5f913dab520348de6b661ad85d3c7067e8e4bf112348eeec9eb6aa7c562cf142a9ed4
-
Filesize
796KB
MD5d16c0cfabc71266f819cf465c4e9f89a
SHA1990e82e9a0be40842a0bfb4bad88d20867c8f65f
SHA256e481f04a7aacc075c1ec9744f54cacb61737d57a30344763af1ec5056e93c88a
SHA5127695f658cd0ceed4a7c69f5d37c84e03ea7992219f1a028b2ceda250a6c5f913dab520348de6b661ad85d3c7067e8e4bf112348eeec9eb6aa7c562cf142a9ed4
-
Filesize
796KB
MD5d16c0cfabc71266f819cf465c4e9f89a
SHA1990e82e9a0be40842a0bfb4bad88d20867c8f65f
SHA256e481f04a7aacc075c1ec9744f54cacb61737d57a30344763af1ec5056e93c88a
SHA5127695f658cd0ceed4a7c69f5d37c84e03ea7992219f1a028b2ceda250a6c5f913dab520348de6b661ad85d3c7067e8e4bf112348eeec9eb6aa7c562cf142a9ed4
-
Filesize
796KB
MD5d16c0cfabc71266f819cf465c4e9f89a
SHA1990e82e9a0be40842a0bfb4bad88d20867c8f65f
SHA256e481f04a7aacc075c1ec9744f54cacb61737d57a30344763af1ec5056e93c88a
SHA5127695f658cd0ceed4a7c69f5d37c84e03ea7992219f1a028b2ceda250a6c5f913dab520348de6b661ad85d3c7067e8e4bf112348eeec9eb6aa7c562cf142a9ed4
-
Filesize
34KB
MD5476f447617f65eebf35c52d4fd3b3188
SHA1179ee6e698803a45be916f107638f01d553d6e65
SHA256a8c7fd29a25658f115213c3516dd8f77d44d42c40f9348996443e593d878dcf0
SHA51237c51cb92a2adaa3fdb70ae41c95f5499e25cc772020d6c701ef9ce157320017ae207896dcc0e27b9841d0b7890a8b37440bff6dfa0468dc01f72275d4c820f9
-
Filesize
34KB
MD5476f447617f65eebf35c52d4fd3b3188
SHA1179ee6e698803a45be916f107638f01d553d6e65
SHA256a8c7fd29a25658f115213c3516dd8f77d44d42c40f9348996443e593d878dcf0
SHA51237c51cb92a2adaa3fdb70ae41c95f5499e25cc772020d6c701ef9ce157320017ae207896dcc0e27b9841d0b7890a8b37440bff6dfa0468dc01f72275d4c820f9