Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
92s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe
Resource
win10v2004-20220812-en
General
-
Target
b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe
-
Size
432KB
-
MD5
6219fa6fc66edc32d3a7e921c83db559
-
SHA1
fcf9aedf036f3a758a28ab3efd2614ffeec9f49d
-
SHA256
b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc
-
SHA512
24d2ff07180e9bda14b504e7b2fd7b685223c809837a22cbeb66ff7b4e1acf8d66038c25023e6914556f34149179b14b8502dc2e2d4f980af31567b82aa4e3b4
-
SSDEEP
6144:NOQwmi5R4YukANAU9EJeW5TUoE5qWcACb3yTVqn3qfakwn8NRkEiLazfXEEQOVaB:N45eNACl8TUcnwST8FimwEBcZvsEeF
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1452 F4D55F6500014973000B9D42B4EB2331.exe -
Deletes itself 1 IoCs
pid Process 1452 F4D55F6500014973000B9D42B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 2028 b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe 2028 b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000B9D42B4EB2331.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\F4D55F6500014973000B9D42B4EB2331 = "C:\\ProgramData\\F4D55F6500014973000B9D42B4EB2331\\F4D55F6500014973000B9D42B4EB2331.exe" F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2028 b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe 2028 b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe 2028 b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe 2028 b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe 2028 b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe 2028 b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe 2028 b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1452 F4D55F6500014973000B9D42B4EB2331.exe 1452 F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1452 2028 b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe 28 PID 2028 wrote to memory of 1452 2028 b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe 28 PID 2028 wrote to memory of 1452 2028 b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe 28 PID 2028 wrote to memory of 1452 2028 b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe"C:\Users\Admin\AppData\Local\Temp\b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\ProgramData\F4D55F6500014973000B9D42B4EB2331\F4D55F6500014973000B9D42B4EB2331.exe"C:\ProgramData\F4D55F6500014973000B9D42B4EB2331\F4D55F6500014973000B9D42B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc.exe"2⤵
- Windows security bypass
- Executes dropped EXE
- Deletes itself
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1452
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
432KB
MD56219fa6fc66edc32d3a7e921c83db559
SHA1fcf9aedf036f3a758a28ab3efd2614ffeec9f49d
SHA256b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc
SHA51224d2ff07180e9bda14b504e7b2fd7b685223c809837a22cbeb66ff7b4e1acf8d66038c25023e6914556f34149179b14b8502dc2e2d4f980af31567b82aa4e3b4
-
Filesize
432KB
MD56219fa6fc66edc32d3a7e921c83db559
SHA1fcf9aedf036f3a758a28ab3efd2614ffeec9f49d
SHA256b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc
SHA51224d2ff07180e9bda14b504e7b2fd7b685223c809837a22cbeb66ff7b4e1acf8d66038c25023e6914556f34149179b14b8502dc2e2d4f980af31567b82aa4e3b4
-
Filesize
432KB
MD56219fa6fc66edc32d3a7e921c83db559
SHA1fcf9aedf036f3a758a28ab3efd2614ffeec9f49d
SHA256b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc
SHA51224d2ff07180e9bda14b504e7b2fd7b685223c809837a22cbeb66ff7b4e1acf8d66038c25023e6914556f34149179b14b8502dc2e2d4f980af31567b82aa4e3b4
-
Filesize
432KB
MD56219fa6fc66edc32d3a7e921c83db559
SHA1fcf9aedf036f3a758a28ab3efd2614ffeec9f49d
SHA256b29886b0c7a8c795600399216e38f5195d6b795264de9cc78b8c8f3ee5a18bcc
SHA51224d2ff07180e9bda14b504e7b2fd7b685223c809837a22cbeb66ff7b4e1acf8d66038c25023e6914556f34149179b14b8502dc2e2d4f980af31567b82aa4e3b4