Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
200s -
max time network
252s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/05/2023, 18:44
Static task
static1
Behavioral task
behavioral1
Sample
dbcd4c0d9a3c24f55e90389f038bb75b433743c0cd57cd877f31c357d67b64a9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
dbcd4c0d9a3c24f55e90389f038bb75b433743c0cd57cd877f31c357d67b64a9.exe
Resource
win10v2004-20230220-en
General
-
Target
dbcd4c0d9a3c24f55e90389f038bb75b433743c0cd57cd877f31c357d67b64a9.exe
-
Size
1.1MB
-
MD5
5cf2288e956b2b813143b6b963ff1b1d
-
SHA1
cb31f0af350a7e8ca259f410ed8c20dd7a5b13e8
-
SHA256
dbcd4c0d9a3c24f55e90389f038bb75b433743c0cd57cd877f31c357d67b64a9
-
SHA512
4ac6b925e43c59b411b6fc3cfd1df3ba7882c370c20a6e00e4db1ed6d22cd64156674bf316aadc306d297b8705a2ba472fd62a567a558b7a689d37b151b19599
-
SSDEEP
24576:/ypMtpV4x/fy/b8XftHvBZcCTdBACKl3RqyuFpK3qaNecz5tO7yNhVIveS:/yWVk6/b8tH5ZrTxxyMp4VNr5hVge
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 106888316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 106888316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 106888316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 106888316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 106888316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 106888316.exe -
Executes dropped EXE 4 IoCs
pid Process 1924 ut865216.exe 684 iY640225.exe 1684 106888316.exe 1220 258768145.exe -
Loads dropped DLL 10 IoCs
pid Process 2032 dbcd4c0d9a3c24f55e90389f038bb75b433743c0cd57cd877f31c357d67b64a9.exe 1924 ut865216.exe 1924 ut865216.exe 684 iY640225.exe 684 iY640225.exe 684 iY640225.exe 1684 106888316.exe 684 iY640225.exe 684 iY640225.exe 1220 258768145.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 106888316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 106888316.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ut865216.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ut865216.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce iY640225.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" iY640225.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce dbcd4c0d9a3c24f55e90389f038bb75b433743c0cd57cd877f31c357d67b64a9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dbcd4c0d9a3c24f55e90389f038bb75b433743c0cd57cd877f31c357d67b64a9.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1684 106888316.exe 1684 106888316.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1684 106888316.exe Token: SeDebugPrivilege 1220 258768145.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1924 2032 dbcd4c0d9a3c24f55e90389f038bb75b433743c0cd57cd877f31c357d67b64a9.exe 28 PID 2032 wrote to memory of 1924 2032 dbcd4c0d9a3c24f55e90389f038bb75b433743c0cd57cd877f31c357d67b64a9.exe 28 PID 2032 wrote to memory of 1924 2032 dbcd4c0d9a3c24f55e90389f038bb75b433743c0cd57cd877f31c357d67b64a9.exe 28 PID 2032 wrote to memory of 1924 2032 dbcd4c0d9a3c24f55e90389f038bb75b433743c0cd57cd877f31c357d67b64a9.exe 28 PID 2032 wrote to memory of 1924 2032 dbcd4c0d9a3c24f55e90389f038bb75b433743c0cd57cd877f31c357d67b64a9.exe 28 PID 2032 wrote to memory of 1924 2032 dbcd4c0d9a3c24f55e90389f038bb75b433743c0cd57cd877f31c357d67b64a9.exe 28 PID 2032 wrote to memory of 1924 2032 dbcd4c0d9a3c24f55e90389f038bb75b433743c0cd57cd877f31c357d67b64a9.exe 28 PID 1924 wrote to memory of 684 1924 ut865216.exe 29 PID 1924 wrote to memory of 684 1924 ut865216.exe 29 PID 1924 wrote to memory of 684 1924 ut865216.exe 29 PID 1924 wrote to memory of 684 1924 ut865216.exe 29 PID 1924 wrote to memory of 684 1924 ut865216.exe 29 PID 1924 wrote to memory of 684 1924 ut865216.exe 29 PID 1924 wrote to memory of 684 1924 ut865216.exe 29 PID 684 wrote to memory of 1684 684 iY640225.exe 30 PID 684 wrote to memory of 1684 684 iY640225.exe 30 PID 684 wrote to memory of 1684 684 iY640225.exe 30 PID 684 wrote to memory of 1684 684 iY640225.exe 30 PID 684 wrote to memory of 1684 684 iY640225.exe 30 PID 684 wrote to memory of 1684 684 iY640225.exe 30 PID 684 wrote to memory of 1684 684 iY640225.exe 30 PID 684 wrote to memory of 1220 684 iY640225.exe 31 PID 684 wrote to memory of 1220 684 iY640225.exe 31 PID 684 wrote to memory of 1220 684 iY640225.exe 31 PID 684 wrote to memory of 1220 684 iY640225.exe 31 PID 684 wrote to memory of 1220 684 iY640225.exe 31 PID 684 wrote to memory of 1220 684 iY640225.exe 31 PID 684 wrote to memory of 1220 684 iY640225.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbcd4c0d9a3c24f55e90389f038bb75b433743c0cd57cd877f31c357d67b64a9.exe"C:\Users\Admin\AppData\Local\Temp\dbcd4c0d9a3c24f55e90389f038bb75b433743c0cd57cd877f31c357d67b64a9.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ut865216.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ut865216.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iY640225.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iY640225.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\106888316.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\106888316.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\258768145.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\258768145.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
719KB
MD5d65c8e9f391cf20655232c5c987b746f
SHA1bfce684cea9f3ad1f8319e3dd581f58ec22df410
SHA2560376e92c9fdd3170bd6c4589d0ab56494bbef6ebb0c1ec8c2be1ea0c637281dc
SHA512226c17e238df5c15eb0a90d5e6922f131e45daa44bee1d7dffe934068cb0db54e03fb23d45826e6daf21f5251bc1cfa65948f19dc45c4c9099376f724e342597
-
Filesize
719KB
MD5d65c8e9f391cf20655232c5c987b746f
SHA1bfce684cea9f3ad1f8319e3dd581f58ec22df410
SHA2560376e92c9fdd3170bd6c4589d0ab56494bbef6ebb0c1ec8c2be1ea0c637281dc
SHA512226c17e238df5c15eb0a90d5e6922f131e45daa44bee1d7dffe934068cb0db54e03fb23d45826e6daf21f5251bc1cfa65948f19dc45c4c9099376f724e342597
-
Filesize
548KB
MD579bb8aa7f82a94ba01dc4b70c63957e0
SHA1535a7c0407de96fdce4bf3017f07b4333e9acc01
SHA256337c493481660ea88e0c92612f9caafff009cf7820f9fb84746b24ed2b64fff9
SHA512c7adba7203490aee60aa1b678632df1b1b168f47810bc927978f9b8b7e8ace467446c58f8ae85f3f5bbd3fa4cbae2ace32f67b893c02282de618878b98b50139
-
Filesize
548KB
MD579bb8aa7f82a94ba01dc4b70c63957e0
SHA1535a7c0407de96fdce4bf3017f07b4333e9acc01
SHA256337c493481660ea88e0c92612f9caafff009cf7820f9fb84746b24ed2b64fff9
SHA512c7adba7203490aee60aa1b678632df1b1b168f47810bc927978f9b8b7e8ace467446c58f8ae85f3f5bbd3fa4cbae2ace32f67b893c02282de618878b98b50139
-
Filesize
278KB
MD5e1b364b4b96ca742b39a069ca1390a0b
SHA1970e15712c7b43117b2144d2dbf2aed590fff249
SHA256dc2f6a4b3d395642bdd40c133807093078b2e6b7f4e683a878d63e258d58cb4b
SHA5124b48624e84da9949c79e3116f9327cd1f1cd1a68cf495db1c7203db470fc668afca3f48674fc47244e6d6e9157a0d3adaa22183a20470a57df1c5f4a31f8573d
-
Filesize
278KB
MD5e1b364b4b96ca742b39a069ca1390a0b
SHA1970e15712c7b43117b2144d2dbf2aed590fff249
SHA256dc2f6a4b3d395642bdd40c133807093078b2e6b7f4e683a878d63e258d58cb4b
SHA5124b48624e84da9949c79e3116f9327cd1f1cd1a68cf495db1c7203db470fc668afca3f48674fc47244e6d6e9157a0d3adaa22183a20470a57df1c5f4a31f8573d
-
Filesize
278KB
MD5e1b364b4b96ca742b39a069ca1390a0b
SHA1970e15712c7b43117b2144d2dbf2aed590fff249
SHA256dc2f6a4b3d395642bdd40c133807093078b2e6b7f4e683a878d63e258d58cb4b
SHA5124b48624e84da9949c79e3116f9327cd1f1cd1a68cf495db1c7203db470fc668afca3f48674fc47244e6d6e9157a0d3adaa22183a20470a57df1c5f4a31f8573d
-
Filesize
360KB
MD5848ce28183931ae67c8a0d8ce3a1efc3
SHA1a39582bf82be42b8cf83b0015130273ab0e51c90
SHA2561920e51f6e64752f4dd7474638b8d86c646e1b8cc4099415d2319d038fe1aff3
SHA512430e793cac623274f0082eaec2377e946d9238f394837272ea4237ef305a00b3db28c081d6c82d2fbcadab0dc5a11769ebd9423e9129279a91ffe4b7aeae4b1d
-
Filesize
360KB
MD5848ce28183931ae67c8a0d8ce3a1efc3
SHA1a39582bf82be42b8cf83b0015130273ab0e51c90
SHA2561920e51f6e64752f4dd7474638b8d86c646e1b8cc4099415d2319d038fe1aff3
SHA512430e793cac623274f0082eaec2377e946d9238f394837272ea4237ef305a00b3db28c081d6c82d2fbcadab0dc5a11769ebd9423e9129279a91ffe4b7aeae4b1d
-
Filesize
360KB
MD5848ce28183931ae67c8a0d8ce3a1efc3
SHA1a39582bf82be42b8cf83b0015130273ab0e51c90
SHA2561920e51f6e64752f4dd7474638b8d86c646e1b8cc4099415d2319d038fe1aff3
SHA512430e793cac623274f0082eaec2377e946d9238f394837272ea4237ef305a00b3db28c081d6c82d2fbcadab0dc5a11769ebd9423e9129279a91ffe4b7aeae4b1d
-
Filesize
719KB
MD5d65c8e9f391cf20655232c5c987b746f
SHA1bfce684cea9f3ad1f8319e3dd581f58ec22df410
SHA2560376e92c9fdd3170bd6c4589d0ab56494bbef6ebb0c1ec8c2be1ea0c637281dc
SHA512226c17e238df5c15eb0a90d5e6922f131e45daa44bee1d7dffe934068cb0db54e03fb23d45826e6daf21f5251bc1cfa65948f19dc45c4c9099376f724e342597
-
Filesize
719KB
MD5d65c8e9f391cf20655232c5c987b746f
SHA1bfce684cea9f3ad1f8319e3dd581f58ec22df410
SHA2560376e92c9fdd3170bd6c4589d0ab56494bbef6ebb0c1ec8c2be1ea0c637281dc
SHA512226c17e238df5c15eb0a90d5e6922f131e45daa44bee1d7dffe934068cb0db54e03fb23d45826e6daf21f5251bc1cfa65948f19dc45c4c9099376f724e342597
-
Filesize
548KB
MD579bb8aa7f82a94ba01dc4b70c63957e0
SHA1535a7c0407de96fdce4bf3017f07b4333e9acc01
SHA256337c493481660ea88e0c92612f9caafff009cf7820f9fb84746b24ed2b64fff9
SHA512c7adba7203490aee60aa1b678632df1b1b168f47810bc927978f9b8b7e8ace467446c58f8ae85f3f5bbd3fa4cbae2ace32f67b893c02282de618878b98b50139
-
Filesize
548KB
MD579bb8aa7f82a94ba01dc4b70c63957e0
SHA1535a7c0407de96fdce4bf3017f07b4333e9acc01
SHA256337c493481660ea88e0c92612f9caafff009cf7820f9fb84746b24ed2b64fff9
SHA512c7adba7203490aee60aa1b678632df1b1b168f47810bc927978f9b8b7e8ace467446c58f8ae85f3f5bbd3fa4cbae2ace32f67b893c02282de618878b98b50139
-
Filesize
278KB
MD5e1b364b4b96ca742b39a069ca1390a0b
SHA1970e15712c7b43117b2144d2dbf2aed590fff249
SHA256dc2f6a4b3d395642bdd40c133807093078b2e6b7f4e683a878d63e258d58cb4b
SHA5124b48624e84da9949c79e3116f9327cd1f1cd1a68cf495db1c7203db470fc668afca3f48674fc47244e6d6e9157a0d3adaa22183a20470a57df1c5f4a31f8573d
-
Filesize
278KB
MD5e1b364b4b96ca742b39a069ca1390a0b
SHA1970e15712c7b43117b2144d2dbf2aed590fff249
SHA256dc2f6a4b3d395642bdd40c133807093078b2e6b7f4e683a878d63e258d58cb4b
SHA5124b48624e84da9949c79e3116f9327cd1f1cd1a68cf495db1c7203db470fc668afca3f48674fc47244e6d6e9157a0d3adaa22183a20470a57df1c5f4a31f8573d
-
Filesize
278KB
MD5e1b364b4b96ca742b39a069ca1390a0b
SHA1970e15712c7b43117b2144d2dbf2aed590fff249
SHA256dc2f6a4b3d395642bdd40c133807093078b2e6b7f4e683a878d63e258d58cb4b
SHA5124b48624e84da9949c79e3116f9327cd1f1cd1a68cf495db1c7203db470fc668afca3f48674fc47244e6d6e9157a0d3adaa22183a20470a57df1c5f4a31f8573d
-
Filesize
360KB
MD5848ce28183931ae67c8a0d8ce3a1efc3
SHA1a39582bf82be42b8cf83b0015130273ab0e51c90
SHA2561920e51f6e64752f4dd7474638b8d86c646e1b8cc4099415d2319d038fe1aff3
SHA512430e793cac623274f0082eaec2377e946d9238f394837272ea4237ef305a00b3db28c081d6c82d2fbcadab0dc5a11769ebd9423e9129279a91ffe4b7aeae4b1d
-
Filesize
360KB
MD5848ce28183931ae67c8a0d8ce3a1efc3
SHA1a39582bf82be42b8cf83b0015130273ab0e51c90
SHA2561920e51f6e64752f4dd7474638b8d86c646e1b8cc4099415d2319d038fe1aff3
SHA512430e793cac623274f0082eaec2377e946d9238f394837272ea4237ef305a00b3db28c081d6c82d2fbcadab0dc5a11769ebd9423e9129279a91ffe4b7aeae4b1d
-
Filesize
360KB
MD5848ce28183931ae67c8a0d8ce3a1efc3
SHA1a39582bf82be42b8cf83b0015130273ab0e51c90
SHA2561920e51f6e64752f4dd7474638b8d86c646e1b8cc4099415d2319d038fe1aff3
SHA512430e793cac623274f0082eaec2377e946d9238f394837272ea4237ef305a00b3db28c081d6c82d2fbcadab0dc5a11769ebd9423e9129279a91ffe4b7aeae4b1d