Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 06:22
Static task
static1
Behavioral task
behavioral1
Sample
bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe
Resource
win10v2004-20221111-en
General
-
Target
bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe
-
Size
337KB
-
MD5
4f1e2451dd49313261cc9a1c94d33d56
-
SHA1
82c743d39fb96f2057e71afb73e93c70ae0f2d30
-
SHA256
bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1
-
SHA512
08a820005c50fc68d47ac86fd84fab9b698f0d19bb0a52c913a0673c4c4b95ba6b0426804f351afd2c2de1ea48d05753876cdb33fb1e09c7da7416ec8400c505
-
SSDEEP
6144:a7Fhjrxd4lakFcJtX7HW5XH7Xv6Ak2GBJR1ND1iS6uq3kPdyumdBFN:qFhj1CrFc3X7HoHj2D/z6fUA/
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000B4090B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000B4090B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000B4090B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000B4090B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000B4090B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1544 F4D55F6500014973000B4090B4EB2331.exe -
Deletes itself 1 IoCs
pid Process 1544 F4D55F6500014973000B4090B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 2004 bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe 2004 bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000B4090B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000B4090B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000B4090B4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000B4090B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000B4090B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000B4090B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000B4090B4EB2331.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce F4D55F6500014973000B4090B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\F4D55F6500014973000B4090B4EB2331 = "C:\\ProgramData\\F4D55F6500014973000B4090B4EB2331\\F4D55F6500014973000B4090B4EB2331.exe" F4D55F6500014973000B4090B4EB2331.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2004 bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe 2004 bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe 2004 bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe 2004 bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe 2004 bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe 2004 bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe 2004 bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe 2004 bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe 2004 bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 2004 bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe 2004 bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 2004 bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 2004 bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 2004 bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1544 F4D55F6500014973000B4090B4EB2331.exe 1544 F4D55F6500014973000B4090B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1544 2004 bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe 28 PID 2004 wrote to memory of 1544 2004 bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe 28 PID 2004 wrote to memory of 1544 2004 bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe 28 PID 2004 wrote to memory of 1544 2004 bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe"C:\Users\Admin\AppData\Local\Temp\bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\ProgramData\F4D55F6500014973000B4090B4EB2331\F4D55F6500014973000B4090B4EB2331.exe"C:\ProgramData\F4D55F6500014973000B4090B4EB2331\F4D55F6500014973000B4090B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1.exe"2⤵
- Windows security bypass
- Executes dropped EXE
- Deletes itself
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1544
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
337KB
MD54f1e2451dd49313261cc9a1c94d33d56
SHA182c743d39fb96f2057e71afb73e93c70ae0f2d30
SHA256bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1
SHA51208a820005c50fc68d47ac86fd84fab9b698f0d19bb0a52c913a0673c4c4b95ba6b0426804f351afd2c2de1ea48d05753876cdb33fb1e09c7da7416ec8400c505
-
Filesize
337KB
MD54f1e2451dd49313261cc9a1c94d33d56
SHA182c743d39fb96f2057e71afb73e93c70ae0f2d30
SHA256bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1
SHA51208a820005c50fc68d47ac86fd84fab9b698f0d19bb0a52c913a0673c4c4b95ba6b0426804f351afd2c2de1ea48d05753876cdb33fb1e09c7da7416ec8400c505
-
Filesize
337KB
MD54f1e2451dd49313261cc9a1c94d33d56
SHA182c743d39fb96f2057e71afb73e93c70ae0f2d30
SHA256bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1
SHA51208a820005c50fc68d47ac86fd84fab9b698f0d19bb0a52c913a0673c4c4b95ba6b0426804f351afd2c2de1ea48d05753876cdb33fb1e09c7da7416ec8400c505
-
Filesize
337KB
MD54f1e2451dd49313261cc9a1c94d33d56
SHA182c743d39fb96f2057e71afb73e93c70ae0f2d30
SHA256bb4fa00b3a7a88c1992c8d8ad10d08fee136a5a8d3992edcbec99333f4334cf1
SHA51208a820005c50fc68d47ac86fd84fab9b698f0d19bb0a52c913a0673c4c4b95ba6b0426804f351afd2c2de1ea48d05753876cdb33fb1e09c7da7416ec8400c505