Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/05/2023, 18:36
Static task
static1
Behavioral task
behavioral1
Sample
d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890.exe
Resource
win10v2004-20230220-en
General
-
Target
d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890.exe
-
Size
690KB
-
MD5
c739646777bfd5d1ae7da944ad269ac3
-
SHA1
d98aca4ac920187c5332a85100ced78017feed0c
-
SHA256
d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890
-
SHA512
f34e727e6126821eeb8c8d7ddbf65f0f7fa972718c24cbc2b6fd2e1134378c8ee5a438ef7c5650ca4db405a2dcee6cb20fde687719177b93fa41b10144a3acc7
-
SSDEEP
12288:Jy90NVXamCIhcVExQBlYGPDqbH7/mAbrLari36NaT3Hc8/oXHyy:Jy8VXcVEW74H7+Ab3ari360T3c85y
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 66824932.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 66824932.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 66824932.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 66824932.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 66824932.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 66824932.exe -
Executes dropped EXE 3 IoCs
pid Process 900 un924195.exe 1308 66824932.exe 2040 rk810407.exe -
Loads dropped DLL 8 IoCs
pid Process 832 d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890.exe 900 un924195.exe 900 un924195.exe 900 un924195.exe 1308 66824932.exe 900 un924195.exe 900 un924195.exe 2040 rk810407.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 66824932.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 66824932.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un924195.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un924195.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1308 66824932.exe 1308 66824932.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1308 66824932.exe Token: SeDebugPrivilege 2040 rk810407.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 832 wrote to memory of 900 832 d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890.exe 27 PID 832 wrote to memory of 900 832 d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890.exe 27 PID 832 wrote to memory of 900 832 d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890.exe 27 PID 832 wrote to memory of 900 832 d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890.exe 27 PID 832 wrote to memory of 900 832 d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890.exe 27 PID 832 wrote to memory of 900 832 d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890.exe 27 PID 832 wrote to memory of 900 832 d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890.exe 27 PID 900 wrote to memory of 1308 900 un924195.exe 28 PID 900 wrote to memory of 1308 900 un924195.exe 28 PID 900 wrote to memory of 1308 900 un924195.exe 28 PID 900 wrote to memory of 1308 900 un924195.exe 28 PID 900 wrote to memory of 1308 900 un924195.exe 28 PID 900 wrote to memory of 1308 900 un924195.exe 28 PID 900 wrote to memory of 1308 900 un924195.exe 28 PID 900 wrote to memory of 2040 900 un924195.exe 29 PID 900 wrote to memory of 2040 900 un924195.exe 29 PID 900 wrote to memory of 2040 900 un924195.exe 29 PID 900 wrote to memory of 2040 900 un924195.exe 29 PID 900 wrote to memory of 2040 900 un924195.exe 29 PID 900 wrote to memory of 2040 900 un924195.exe 29 PID 900 wrote to memory of 2040 900 un924195.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890.exe"C:\Users\Admin\AppData\Local\Temp\d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un924195.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un924195.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\66824932.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\66824932.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk810407.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk810407.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD52ad672d5abbebef235a4972809593839
SHA1c655da2f1fd47c1a5b604536fbc59cd878f343f5
SHA25612a282aa9dcca2ee23d956e73455e7a4f4608184286f108fadb2d63ebd2edd86
SHA5120741dd229369b9b6120f04e58e3b11a54faea91857ccc1c43bf051b22297b8783ffd25f435e4272922c4c3c82ce800da5577c2fe1552ac46974588f8cacb0c8f
-
Filesize
536KB
MD52ad672d5abbebef235a4972809593839
SHA1c655da2f1fd47c1a5b604536fbc59cd878f343f5
SHA25612a282aa9dcca2ee23d956e73455e7a4f4608184286f108fadb2d63ebd2edd86
SHA5120741dd229369b9b6120f04e58e3b11a54faea91857ccc1c43bf051b22297b8783ffd25f435e4272922c4c3c82ce800da5577c2fe1552ac46974588f8cacb0c8f
-
Filesize
259KB
MD5a72b294115d9456f54c5cbc18387d1dd
SHA16b6c2578b326321591f4b629a43ba1178c5d1453
SHA256514293c4815fab741a85209b5d1210deb252d05d9eded2c76021c4870730f773
SHA5128b49e50a9877f411e0aaa2e41456a58cd1aec4bf60ab0cd973567d33612b4b6d3e650bdea69284a54a8fa556aa4b13a78e0aef91b96091f0c2d1a667bfc29dad
-
Filesize
259KB
MD5a72b294115d9456f54c5cbc18387d1dd
SHA16b6c2578b326321591f4b629a43ba1178c5d1453
SHA256514293c4815fab741a85209b5d1210deb252d05d9eded2c76021c4870730f773
SHA5128b49e50a9877f411e0aaa2e41456a58cd1aec4bf60ab0cd973567d33612b4b6d3e650bdea69284a54a8fa556aa4b13a78e0aef91b96091f0c2d1a667bfc29dad
-
Filesize
259KB
MD5a72b294115d9456f54c5cbc18387d1dd
SHA16b6c2578b326321591f4b629a43ba1178c5d1453
SHA256514293c4815fab741a85209b5d1210deb252d05d9eded2c76021c4870730f773
SHA5128b49e50a9877f411e0aaa2e41456a58cd1aec4bf60ab0cd973567d33612b4b6d3e650bdea69284a54a8fa556aa4b13a78e0aef91b96091f0c2d1a667bfc29dad
-
Filesize
341KB
MD5ff7d8e449dfe37d4a83b77708dbb714e
SHA13fdceec5f99e42ff0c5fec12ee497cbf215527dc
SHA2569f8167c60e0d4899ef4d3ec9aa855d2181523c4546f3f7140461b8c798b5c5c8
SHA512479d6244e99b00acb27826bfb6c6215d070fd899c66b36a51b875be0d00bfd44c07f75ec1fa883cf960bd21cd45715463ded8a564ee2dba22cafaec5b1510a19
-
Filesize
341KB
MD5ff7d8e449dfe37d4a83b77708dbb714e
SHA13fdceec5f99e42ff0c5fec12ee497cbf215527dc
SHA2569f8167c60e0d4899ef4d3ec9aa855d2181523c4546f3f7140461b8c798b5c5c8
SHA512479d6244e99b00acb27826bfb6c6215d070fd899c66b36a51b875be0d00bfd44c07f75ec1fa883cf960bd21cd45715463ded8a564ee2dba22cafaec5b1510a19
-
Filesize
341KB
MD5ff7d8e449dfe37d4a83b77708dbb714e
SHA13fdceec5f99e42ff0c5fec12ee497cbf215527dc
SHA2569f8167c60e0d4899ef4d3ec9aa855d2181523c4546f3f7140461b8c798b5c5c8
SHA512479d6244e99b00acb27826bfb6c6215d070fd899c66b36a51b875be0d00bfd44c07f75ec1fa883cf960bd21cd45715463ded8a564ee2dba22cafaec5b1510a19
-
Filesize
536KB
MD52ad672d5abbebef235a4972809593839
SHA1c655da2f1fd47c1a5b604536fbc59cd878f343f5
SHA25612a282aa9dcca2ee23d956e73455e7a4f4608184286f108fadb2d63ebd2edd86
SHA5120741dd229369b9b6120f04e58e3b11a54faea91857ccc1c43bf051b22297b8783ffd25f435e4272922c4c3c82ce800da5577c2fe1552ac46974588f8cacb0c8f
-
Filesize
536KB
MD52ad672d5abbebef235a4972809593839
SHA1c655da2f1fd47c1a5b604536fbc59cd878f343f5
SHA25612a282aa9dcca2ee23d956e73455e7a4f4608184286f108fadb2d63ebd2edd86
SHA5120741dd229369b9b6120f04e58e3b11a54faea91857ccc1c43bf051b22297b8783ffd25f435e4272922c4c3c82ce800da5577c2fe1552ac46974588f8cacb0c8f
-
Filesize
259KB
MD5a72b294115d9456f54c5cbc18387d1dd
SHA16b6c2578b326321591f4b629a43ba1178c5d1453
SHA256514293c4815fab741a85209b5d1210deb252d05d9eded2c76021c4870730f773
SHA5128b49e50a9877f411e0aaa2e41456a58cd1aec4bf60ab0cd973567d33612b4b6d3e650bdea69284a54a8fa556aa4b13a78e0aef91b96091f0c2d1a667bfc29dad
-
Filesize
259KB
MD5a72b294115d9456f54c5cbc18387d1dd
SHA16b6c2578b326321591f4b629a43ba1178c5d1453
SHA256514293c4815fab741a85209b5d1210deb252d05d9eded2c76021c4870730f773
SHA5128b49e50a9877f411e0aaa2e41456a58cd1aec4bf60ab0cd973567d33612b4b6d3e650bdea69284a54a8fa556aa4b13a78e0aef91b96091f0c2d1a667bfc29dad
-
Filesize
259KB
MD5a72b294115d9456f54c5cbc18387d1dd
SHA16b6c2578b326321591f4b629a43ba1178c5d1453
SHA256514293c4815fab741a85209b5d1210deb252d05d9eded2c76021c4870730f773
SHA5128b49e50a9877f411e0aaa2e41456a58cd1aec4bf60ab0cd973567d33612b4b6d3e650bdea69284a54a8fa556aa4b13a78e0aef91b96091f0c2d1a667bfc29dad
-
Filesize
341KB
MD5ff7d8e449dfe37d4a83b77708dbb714e
SHA13fdceec5f99e42ff0c5fec12ee497cbf215527dc
SHA2569f8167c60e0d4899ef4d3ec9aa855d2181523c4546f3f7140461b8c798b5c5c8
SHA512479d6244e99b00acb27826bfb6c6215d070fd899c66b36a51b875be0d00bfd44c07f75ec1fa883cf960bd21cd45715463ded8a564ee2dba22cafaec5b1510a19
-
Filesize
341KB
MD5ff7d8e449dfe37d4a83b77708dbb714e
SHA13fdceec5f99e42ff0c5fec12ee497cbf215527dc
SHA2569f8167c60e0d4899ef4d3ec9aa855d2181523c4546f3f7140461b8c798b5c5c8
SHA512479d6244e99b00acb27826bfb6c6215d070fd899c66b36a51b875be0d00bfd44c07f75ec1fa883cf960bd21cd45715463ded8a564ee2dba22cafaec5b1510a19
-
Filesize
341KB
MD5ff7d8e449dfe37d4a83b77708dbb714e
SHA13fdceec5f99e42ff0c5fec12ee497cbf215527dc
SHA2569f8167c60e0d4899ef4d3ec9aa855d2181523c4546f3f7140461b8c798b5c5c8
SHA512479d6244e99b00acb27826bfb6c6215d070fd899c66b36a51b875be0d00bfd44c07f75ec1fa883cf960bd21cd45715463ded8a564ee2dba22cafaec5b1510a19