Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
82s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 07:33
Static task
static1
Behavioral task
behavioral1
Sample
bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe
Resource
win10v2004-20220812-en
General
-
Target
bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe
-
Size
444KB
-
MD5
03075256a8cdfdfee51638159b92c570
-
SHA1
73da4920531377f6ea5c01aea9678c7c6ee2d89c
-
SHA256
bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245
-
SHA512
517eb1033d1ca3b85c7dac5a76917b9d5ff028188e039db12b19b528d58eaf4dd2036fa9798a8185025d36fcbdaf3b417b7dcfe3704227434655310cd1349367
-
SSDEEP
6144:sLtyY6maCIFOWUlXyx30XufhdP97+jUBs0byMQFqqMQxw4SLGtj4At7kO0rKhPa:QymaUAJh3SNjMQxMQlftj4g7C83t
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000C06C9B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000C06C9B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000C06C9B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000C06C9B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000C06C9B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1900 F4D55F6500014973000C06C9B4EB2331.exe -
Deletes itself 1 IoCs
pid Process 1900 F4D55F6500014973000C06C9B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 1160 bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe 1160 bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000C06C9B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000C06C9B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000C06C9B4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000C06C9B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000C06C9B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000C06C9B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000C06C9B4EB2331.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\F4D55F6500014973000C06C9B4EB2331 = "C:\\ProgramData\\F4D55F6500014973000C06C9B4EB2331\\F4D55F6500014973000C06C9B4EB2331.exe" F4D55F6500014973000C06C9B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1160 bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe 1160 bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe 1160 bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe 1160 bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe 1160 bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe 1160 bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe 1160 bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1900 F4D55F6500014973000C06C9B4EB2331.exe 1900 F4D55F6500014973000C06C9B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1160 wrote to memory of 1900 1160 bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe 26 PID 1160 wrote to memory of 1900 1160 bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe 26 PID 1160 wrote to memory of 1900 1160 bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe 26 PID 1160 wrote to memory of 1900 1160 bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe"C:\Users\Admin\AppData\Local\Temp\bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\ProgramData\F4D55F6500014973000C06C9B4EB2331\F4D55F6500014973000C06C9B4EB2331.exe"C:\ProgramData\F4D55F6500014973000C06C9B4EB2331\F4D55F6500014973000C06C9B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245.exe"2⤵
- Windows security bypass
- Executes dropped EXE
- Deletes itself
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1900
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
444KB
MD503075256a8cdfdfee51638159b92c570
SHA173da4920531377f6ea5c01aea9678c7c6ee2d89c
SHA256bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245
SHA512517eb1033d1ca3b85c7dac5a76917b9d5ff028188e039db12b19b528d58eaf4dd2036fa9798a8185025d36fcbdaf3b417b7dcfe3704227434655310cd1349367
-
Filesize
444KB
MD503075256a8cdfdfee51638159b92c570
SHA173da4920531377f6ea5c01aea9678c7c6ee2d89c
SHA256bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245
SHA512517eb1033d1ca3b85c7dac5a76917b9d5ff028188e039db12b19b528d58eaf4dd2036fa9798a8185025d36fcbdaf3b417b7dcfe3704227434655310cd1349367
-
Filesize
444KB
MD503075256a8cdfdfee51638159b92c570
SHA173da4920531377f6ea5c01aea9678c7c6ee2d89c
SHA256bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245
SHA512517eb1033d1ca3b85c7dac5a76917b9d5ff028188e039db12b19b528d58eaf4dd2036fa9798a8185025d36fcbdaf3b417b7dcfe3704227434655310cd1349367
-
Filesize
444KB
MD503075256a8cdfdfee51638159b92c570
SHA173da4920531377f6ea5c01aea9678c7c6ee2d89c
SHA256bebee034a82fa71a1878ad5fea8ddffc1b8fe16c59cdc7281de0e7b320bc1245
SHA512517eb1033d1ca3b85c7dac5a76917b9d5ff028188e039db12b19b528d58eaf4dd2036fa9798a8185025d36fcbdaf3b417b7dcfe3704227434655310cd1349367