Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
10/01/2023, 02:47
Static task
static1
Behavioral task
behavioral1
Sample
13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe
Resource
win10v2004-20220812-en
General
-
Target
13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe
-
Size
408KB
-
MD5
a0faf0ec4e001d9c43adc4f85ae1aade
-
SHA1
13420150c9f0f158013e8b4d6e910d0fb36d44e7
-
SHA256
9953ee5b39c7cd8336ce76c582ce6bae897c6606c05a3ef2ba74b229fa4d9204
-
SHA512
1d8a3ed346c389a1d6f10976b02293f8c71aec1c1c44746dd30bd67678cb5871b855184b8d3e8976ff1775e4827704d1044266688aa3186f29e6eb1dd7387884
-
SSDEEP
12288:JnTydH621pXQoBK/xcMizi1FbRshgJ+T:JTydbpzBKmtinbeeJY
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000CAE15B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000CAE15B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000CAE15B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000CAE15B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000CAE15B4EB2331.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1740 F4D55F6500014973000CAE15B4EB2331.exe -
Deletes itself 1 IoCs
pid Process 1740 F4D55F6500014973000CAE15B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 1744 13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe 1744 13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000CAE15B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000CAE15B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000CAE15B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000CAE15B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000CAE15B4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000CAE15B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000CAE15B4EB2331.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\F4D55F6500014973000CAE15B4EB2331 = "C:\\ProgramData\\F4D55F6500014973000CAE15B4EB2331\\F4D55F6500014973000CAE15B4EB2331.exe" F4D55F6500014973000CAE15B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1744 13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe 1744 13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe 1744 13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe 1744 13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe 1744 13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe 1744 13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe 1744 13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1740 F4D55F6500014973000CAE15B4EB2331.exe 1740 F4D55F6500014973000CAE15B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1740 1744 13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe 28 PID 1744 wrote to memory of 1740 1744 13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe 28 PID 1744 wrote to memory of 1740 1744 13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe 28 PID 1744 wrote to memory of 1740 1744 13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe"C:\Users\Admin\AppData\Local\Temp\13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\ProgramData\F4D55F6500014973000CAE15B4EB2331\F4D55F6500014973000CAE15B4EB2331.exe"C:\ProgramData\F4D55F6500014973000CAE15B4EB2331\F4D55F6500014973000CAE15B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\13420150c9f0f158013e8b4d6e910d0fb36d44e7.exe"2⤵
- Windows security bypass
- Executes dropped EXE
- Deletes itself
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1740
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5a0faf0ec4e001d9c43adc4f85ae1aade
SHA113420150c9f0f158013e8b4d6e910d0fb36d44e7
SHA2569953ee5b39c7cd8336ce76c582ce6bae897c6606c05a3ef2ba74b229fa4d9204
SHA5121d8a3ed346c389a1d6f10976b02293f8c71aec1c1c44746dd30bd67678cb5871b855184b8d3e8976ff1775e4827704d1044266688aa3186f29e6eb1dd7387884
-
Filesize
408KB
MD5a0faf0ec4e001d9c43adc4f85ae1aade
SHA113420150c9f0f158013e8b4d6e910d0fb36d44e7
SHA2569953ee5b39c7cd8336ce76c582ce6bae897c6606c05a3ef2ba74b229fa4d9204
SHA5121d8a3ed346c389a1d6f10976b02293f8c71aec1c1c44746dd30bd67678cb5871b855184b8d3e8976ff1775e4827704d1044266688aa3186f29e6eb1dd7387884
-
Filesize
408KB
MD5a0faf0ec4e001d9c43adc4f85ae1aade
SHA113420150c9f0f158013e8b4d6e910d0fb36d44e7
SHA2569953ee5b39c7cd8336ce76c582ce6bae897c6606c05a3ef2ba74b229fa4d9204
SHA5121d8a3ed346c389a1d6f10976b02293f8c71aec1c1c44746dd30bd67678cb5871b855184b8d3e8976ff1775e4827704d1044266688aa3186f29e6eb1dd7387884
-
Filesize
408KB
MD5a0faf0ec4e001d9c43adc4f85ae1aade
SHA113420150c9f0f158013e8b4d6e910d0fb36d44e7
SHA2569953ee5b39c7cd8336ce76c582ce6bae897c6606c05a3ef2ba74b229fa4d9204
SHA5121d8a3ed346c389a1d6f10976b02293f8c71aec1c1c44746dd30bd67678cb5871b855184b8d3e8976ff1775e4827704d1044266688aa3186f29e6eb1dd7387884