Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2023, 18:27

General

  • Target

    cdc39c393e568869248dee077808c74a5d4bce8ddf68fce5d31d02e62a903ac0.exe

  • Size

    612KB

  • MD5

    612478b7e6630a65dc2944f79ae1ac70

  • SHA1

    c9acf440838a19c14fc7cc9146e76743c2b3174f

  • SHA256

    cdc39c393e568869248dee077808c74a5d4bce8ddf68fce5d31d02e62a903ac0

  • SHA512

    0d7fb6f06076d518b9169d52f9e9da2555e5e9ada903bd78b1c538e7951396888663e479dc86e2f08e42dbd4893fd55ceedbb620dd742b9030d02cab3230cde1

  • SSDEEP

    12288:Jy90EG+an4kf8cewJ2H3F1rsP3MqgShiIisYlKZ9VxU5:JylaD8xwJWG35hHijk/xU5

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cdc39c393e568869248dee077808c74a5d4bce8ddf68fce5d31d02e62a903ac0.exe
    "C:\Users\Admin\AppData\Local\Temp\cdc39c393e568869248dee077808c74a5d4bce8ddf68fce5d31d02e62a903ac0.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1128
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st542404.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st542404.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\46409418.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\46409418.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:336
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp450499.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp450499.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:568

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st542404.exe

    Filesize

    457KB

    MD5

    a0cae377e3a1f01302ef455ceee3f1bc

    SHA1

    afd7e064f121cf7a486242828a3c9b352dfddd5f

    SHA256

    aff3bbfb2cdad14c524bc2edc45c96c3b26d249e63b6a7acf589882634b2c660

    SHA512

    4280d0b7d5269c04710e9d2949f555c699b480aa2e7ff4eea804568f89e9b1d2d4bcbe26602b5d474fc3064c5d2ee5125266cc463cb0c2c2a5735afac3123860

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st542404.exe

    Filesize

    457KB

    MD5

    a0cae377e3a1f01302ef455ceee3f1bc

    SHA1

    afd7e064f121cf7a486242828a3c9b352dfddd5f

    SHA256

    aff3bbfb2cdad14c524bc2edc45c96c3b26d249e63b6a7acf589882634b2c660

    SHA512

    4280d0b7d5269c04710e9d2949f555c699b480aa2e7ff4eea804568f89e9b1d2d4bcbe26602b5d474fc3064c5d2ee5125266cc463cb0c2c2a5735afac3123860

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\46409418.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\46409418.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp450499.exe

    Filesize

    459KB

    MD5

    a7142183c1fc3deaaf30ac4450f0cb56

    SHA1

    bb914446108e0dca8bb6bb8b7057ea27a5ecf931

    SHA256

    e644a8e3af4a5fbbf59475abc7a4c73bd90d11c4422327bd726d45320f603251

    SHA512

    40ef4a59e7c8de72e9f5777ade2751452ff6813682c7999b8bfddf50945af66409688684ff205bcf737a333efb958a6f764d31b159765124a15ef370629bf05f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp450499.exe

    Filesize

    459KB

    MD5

    a7142183c1fc3deaaf30ac4450f0cb56

    SHA1

    bb914446108e0dca8bb6bb8b7057ea27a5ecf931

    SHA256

    e644a8e3af4a5fbbf59475abc7a4c73bd90d11c4422327bd726d45320f603251

    SHA512

    40ef4a59e7c8de72e9f5777ade2751452ff6813682c7999b8bfddf50945af66409688684ff205bcf737a333efb958a6f764d31b159765124a15ef370629bf05f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp450499.exe

    Filesize

    459KB

    MD5

    a7142183c1fc3deaaf30ac4450f0cb56

    SHA1

    bb914446108e0dca8bb6bb8b7057ea27a5ecf931

    SHA256

    e644a8e3af4a5fbbf59475abc7a4c73bd90d11c4422327bd726d45320f603251

    SHA512

    40ef4a59e7c8de72e9f5777ade2751452ff6813682c7999b8bfddf50945af66409688684ff205bcf737a333efb958a6f764d31b159765124a15ef370629bf05f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st542404.exe

    Filesize

    457KB

    MD5

    a0cae377e3a1f01302ef455ceee3f1bc

    SHA1

    afd7e064f121cf7a486242828a3c9b352dfddd5f

    SHA256

    aff3bbfb2cdad14c524bc2edc45c96c3b26d249e63b6a7acf589882634b2c660

    SHA512

    4280d0b7d5269c04710e9d2949f555c699b480aa2e7ff4eea804568f89e9b1d2d4bcbe26602b5d474fc3064c5d2ee5125266cc463cb0c2c2a5735afac3123860

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st542404.exe

    Filesize

    457KB

    MD5

    a0cae377e3a1f01302ef455ceee3f1bc

    SHA1

    afd7e064f121cf7a486242828a3c9b352dfddd5f

    SHA256

    aff3bbfb2cdad14c524bc2edc45c96c3b26d249e63b6a7acf589882634b2c660

    SHA512

    4280d0b7d5269c04710e9d2949f555c699b480aa2e7ff4eea804568f89e9b1d2d4bcbe26602b5d474fc3064c5d2ee5125266cc463cb0c2c2a5735afac3123860

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\46409418.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp450499.exe

    Filesize

    459KB

    MD5

    a7142183c1fc3deaaf30ac4450f0cb56

    SHA1

    bb914446108e0dca8bb6bb8b7057ea27a5ecf931

    SHA256

    e644a8e3af4a5fbbf59475abc7a4c73bd90d11c4422327bd726d45320f603251

    SHA512

    40ef4a59e7c8de72e9f5777ade2751452ff6813682c7999b8bfddf50945af66409688684ff205bcf737a333efb958a6f764d31b159765124a15ef370629bf05f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp450499.exe

    Filesize

    459KB

    MD5

    a7142183c1fc3deaaf30ac4450f0cb56

    SHA1

    bb914446108e0dca8bb6bb8b7057ea27a5ecf931

    SHA256

    e644a8e3af4a5fbbf59475abc7a4c73bd90d11c4422327bd726d45320f603251

    SHA512

    40ef4a59e7c8de72e9f5777ade2751452ff6813682c7999b8bfddf50945af66409688684ff205bcf737a333efb958a6f764d31b159765124a15ef370629bf05f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp450499.exe

    Filesize

    459KB

    MD5

    a7142183c1fc3deaaf30ac4450f0cb56

    SHA1

    bb914446108e0dca8bb6bb8b7057ea27a5ecf931

    SHA256

    e644a8e3af4a5fbbf59475abc7a4c73bd90d11c4422327bd726d45320f603251

    SHA512

    40ef4a59e7c8de72e9f5777ade2751452ff6813682c7999b8bfddf50945af66409688684ff205bcf737a333efb958a6f764d31b159765124a15ef370629bf05f

  • memory/336-72-0x0000000000BE0000-0x0000000000BEA000-memory.dmp

    Filesize

    40KB

  • memory/568-106-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-122-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-85-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-86-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-88-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-90-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-92-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-94-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-96-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-98-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-100-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-104-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-83-0x00000000027D0000-0x000000000280C000-memory.dmp

    Filesize

    240KB

  • memory/568-102-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-108-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-110-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-112-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-114-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-116-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-118-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-120-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-84-0x0000000004E50000-0x0000000004E8A000-memory.dmp

    Filesize

    232KB

  • memory/568-124-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-126-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-128-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-130-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-132-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-134-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-136-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-138-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-140-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-142-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-144-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-146-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-148-0x0000000004E50000-0x0000000004E85000-memory.dmp

    Filesize

    212KB

  • memory/568-329-0x0000000000890000-0x00000000008D6000-memory.dmp

    Filesize

    280KB

  • memory/568-331-0x0000000004F20000-0x0000000004F60000-memory.dmp

    Filesize

    256KB

  • memory/568-333-0x0000000004F20000-0x0000000004F60000-memory.dmp

    Filesize

    256KB

  • memory/568-880-0x0000000004F20000-0x0000000004F60000-memory.dmp

    Filesize

    256KB

  • memory/568-882-0x0000000004F20000-0x0000000004F60000-memory.dmp

    Filesize

    256KB

  • memory/568-883-0x0000000004F20000-0x0000000004F60000-memory.dmp

    Filesize

    256KB