Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/05/2023, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe
Resource
win10v2004-20230220-en
General
-
Target
e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe
-
Size
746KB
-
MD5
1fee0f7b533ee66bd71dd39e41ebbb8e
-
SHA1
17f13bf225bf3d4fdfb1958c7ef904bd5885f222
-
SHA256
e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976
-
SHA512
d8d838c06b1afb71ecf0fbf83298a2f168e0c712294f21893786c67725d3035cff77be98552402c264bdd28e3005b14decef20dc5300cdb1ed66b1b3c7f86a83
-
SSDEEP
12288:6y90kxDahz4bgBvOci1Jex6PCd5A9R2392gBtFlseS8iA3WJp58amgL:6yTDadCgVO1wEPCd4IgAFlVIA3aRL
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 26296634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 26296634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 26296634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 26296634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 26296634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 26296634.exe -
Executes dropped EXE 3 IoCs
pid Process 1948 un689605.exe 364 26296634.exe 1100 rk383194.exe -
Loads dropped DLL 8 IoCs
pid Process 2040 e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe 1948 un689605.exe 1948 un689605.exe 1948 un689605.exe 364 26296634.exe 1948 un689605.exe 1948 un689605.exe 1100 rk383194.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 26296634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 26296634.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un689605.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un689605.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 364 26296634.exe 364 26296634.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 364 26296634.exe Token: SeDebugPrivilege 1100 rk383194.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1948 2040 e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe 28 PID 2040 wrote to memory of 1948 2040 e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe 28 PID 2040 wrote to memory of 1948 2040 e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe 28 PID 2040 wrote to memory of 1948 2040 e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe 28 PID 2040 wrote to memory of 1948 2040 e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe 28 PID 2040 wrote to memory of 1948 2040 e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe 28 PID 2040 wrote to memory of 1948 2040 e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe 28 PID 1948 wrote to memory of 364 1948 un689605.exe 29 PID 1948 wrote to memory of 364 1948 un689605.exe 29 PID 1948 wrote to memory of 364 1948 un689605.exe 29 PID 1948 wrote to memory of 364 1948 un689605.exe 29 PID 1948 wrote to memory of 364 1948 un689605.exe 29 PID 1948 wrote to memory of 364 1948 un689605.exe 29 PID 1948 wrote to memory of 364 1948 un689605.exe 29 PID 1948 wrote to memory of 1100 1948 un689605.exe 30 PID 1948 wrote to memory of 1100 1948 un689605.exe 30 PID 1948 wrote to memory of 1100 1948 un689605.exe 30 PID 1948 wrote to memory of 1100 1948 un689605.exe 30 PID 1948 wrote to memory of 1100 1948 un689605.exe 30 PID 1948 wrote to memory of 1100 1948 un689605.exe 30 PID 1948 wrote to memory of 1100 1948 un689605.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe"C:\Users\Admin\AppData\Local\Temp\e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un689605.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un689605.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26296634.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26296634.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:364
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk383194.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk383194.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
592KB
MD5d79970db0c3ead814c186f25abfd1c07
SHA14fa7f2efc0109ed7494a3366ffb675204050d1f6
SHA256daf17cf944892b581ac40838256b97f5b4ab6660d0badfa9d506a9b9ec4bce7b
SHA512531baddcf8d5de35234457dba45894adea97b5eb6e512954c83d6f6e05f0e49bc5f44189d5bf5aa9e8f5f282c608b2f22b2e0f1b96d224ab523312cb0ac6133f
-
Filesize
592KB
MD5d79970db0c3ead814c186f25abfd1c07
SHA14fa7f2efc0109ed7494a3366ffb675204050d1f6
SHA256daf17cf944892b581ac40838256b97f5b4ab6660d0badfa9d506a9b9ec4bce7b
SHA512531baddcf8d5de35234457dba45894adea97b5eb6e512954c83d6f6e05f0e49bc5f44189d5bf5aa9e8f5f282c608b2f22b2e0f1b96d224ab523312cb0ac6133f
-
Filesize
376KB
MD57415a74e50bfc4d36c408a42fcaa547d
SHA16c95028306f28241aef49b50afc1a8a1e3aa0bfb
SHA256a172dfbcb6bb3667b4cdbb204ca8f62b14282ca303375f9d9b2a40553859b915
SHA5120954b333e97a272d526faf094d9d866cfc304e9c4c1428d4d657972ccf4b9f06bb6019ac6a4e98e1aff0ed1371fce34e6686592b308962bb138101397d726dbb
-
Filesize
376KB
MD57415a74e50bfc4d36c408a42fcaa547d
SHA16c95028306f28241aef49b50afc1a8a1e3aa0bfb
SHA256a172dfbcb6bb3667b4cdbb204ca8f62b14282ca303375f9d9b2a40553859b915
SHA5120954b333e97a272d526faf094d9d866cfc304e9c4c1428d4d657972ccf4b9f06bb6019ac6a4e98e1aff0ed1371fce34e6686592b308962bb138101397d726dbb
-
Filesize
376KB
MD57415a74e50bfc4d36c408a42fcaa547d
SHA16c95028306f28241aef49b50afc1a8a1e3aa0bfb
SHA256a172dfbcb6bb3667b4cdbb204ca8f62b14282ca303375f9d9b2a40553859b915
SHA5120954b333e97a272d526faf094d9d866cfc304e9c4c1428d4d657972ccf4b9f06bb6019ac6a4e98e1aff0ed1371fce34e6686592b308962bb138101397d726dbb
-
Filesize
459KB
MD5481ae74b82b66cb52dbf531b6adea9c7
SHA19518b1c74bee8e6ad5f148aeb5e2f84c72f14eac
SHA256fe99680b977dacc4288a31871875b91d0e7dc9f7868b56531932eef964085d39
SHA512a1351e8f66ea4781dae990bd0903242910acdd376908c572f1045eba82b7c19cbe97c19dc73aecc7905c4f25891688a1d6885802ce875e3698a6e1ef0d4217ad
-
Filesize
459KB
MD5481ae74b82b66cb52dbf531b6adea9c7
SHA19518b1c74bee8e6ad5f148aeb5e2f84c72f14eac
SHA256fe99680b977dacc4288a31871875b91d0e7dc9f7868b56531932eef964085d39
SHA512a1351e8f66ea4781dae990bd0903242910acdd376908c572f1045eba82b7c19cbe97c19dc73aecc7905c4f25891688a1d6885802ce875e3698a6e1ef0d4217ad
-
Filesize
459KB
MD5481ae74b82b66cb52dbf531b6adea9c7
SHA19518b1c74bee8e6ad5f148aeb5e2f84c72f14eac
SHA256fe99680b977dacc4288a31871875b91d0e7dc9f7868b56531932eef964085d39
SHA512a1351e8f66ea4781dae990bd0903242910acdd376908c572f1045eba82b7c19cbe97c19dc73aecc7905c4f25891688a1d6885802ce875e3698a6e1ef0d4217ad
-
Filesize
592KB
MD5d79970db0c3ead814c186f25abfd1c07
SHA14fa7f2efc0109ed7494a3366ffb675204050d1f6
SHA256daf17cf944892b581ac40838256b97f5b4ab6660d0badfa9d506a9b9ec4bce7b
SHA512531baddcf8d5de35234457dba45894adea97b5eb6e512954c83d6f6e05f0e49bc5f44189d5bf5aa9e8f5f282c608b2f22b2e0f1b96d224ab523312cb0ac6133f
-
Filesize
592KB
MD5d79970db0c3ead814c186f25abfd1c07
SHA14fa7f2efc0109ed7494a3366ffb675204050d1f6
SHA256daf17cf944892b581ac40838256b97f5b4ab6660d0badfa9d506a9b9ec4bce7b
SHA512531baddcf8d5de35234457dba45894adea97b5eb6e512954c83d6f6e05f0e49bc5f44189d5bf5aa9e8f5f282c608b2f22b2e0f1b96d224ab523312cb0ac6133f
-
Filesize
376KB
MD57415a74e50bfc4d36c408a42fcaa547d
SHA16c95028306f28241aef49b50afc1a8a1e3aa0bfb
SHA256a172dfbcb6bb3667b4cdbb204ca8f62b14282ca303375f9d9b2a40553859b915
SHA5120954b333e97a272d526faf094d9d866cfc304e9c4c1428d4d657972ccf4b9f06bb6019ac6a4e98e1aff0ed1371fce34e6686592b308962bb138101397d726dbb
-
Filesize
376KB
MD57415a74e50bfc4d36c408a42fcaa547d
SHA16c95028306f28241aef49b50afc1a8a1e3aa0bfb
SHA256a172dfbcb6bb3667b4cdbb204ca8f62b14282ca303375f9d9b2a40553859b915
SHA5120954b333e97a272d526faf094d9d866cfc304e9c4c1428d4d657972ccf4b9f06bb6019ac6a4e98e1aff0ed1371fce34e6686592b308962bb138101397d726dbb
-
Filesize
376KB
MD57415a74e50bfc4d36c408a42fcaa547d
SHA16c95028306f28241aef49b50afc1a8a1e3aa0bfb
SHA256a172dfbcb6bb3667b4cdbb204ca8f62b14282ca303375f9d9b2a40553859b915
SHA5120954b333e97a272d526faf094d9d866cfc304e9c4c1428d4d657972ccf4b9f06bb6019ac6a4e98e1aff0ed1371fce34e6686592b308962bb138101397d726dbb
-
Filesize
459KB
MD5481ae74b82b66cb52dbf531b6adea9c7
SHA19518b1c74bee8e6ad5f148aeb5e2f84c72f14eac
SHA256fe99680b977dacc4288a31871875b91d0e7dc9f7868b56531932eef964085d39
SHA512a1351e8f66ea4781dae990bd0903242910acdd376908c572f1045eba82b7c19cbe97c19dc73aecc7905c4f25891688a1d6885802ce875e3698a6e1ef0d4217ad
-
Filesize
459KB
MD5481ae74b82b66cb52dbf531b6adea9c7
SHA19518b1c74bee8e6ad5f148aeb5e2f84c72f14eac
SHA256fe99680b977dacc4288a31871875b91d0e7dc9f7868b56531932eef964085d39
SHA512a1351e8f66ea4781dae990bd0903242910acdd376908c572f1045eba82b7c19cbe97c19dc73aecc7905c4f25891688a1d6885802ce875e3698a6e1ef0d4217ad
-
Filesize
459KB
MD5481ae74b82b66cb52dbf531b6adea9c7
SHA19518b1c74bee8e6ad5f148aeb5e2f84c72f14eac
SHA256fe99680b977dacc4288a31871875b91d0e7dc9f7868b56531932eef964085d39
SHA512a1351e8f66ea4781dae990bd0903242910acdd376908c572f1045eba82b7c19cbe97c19dc73aecc7905c4f25891688a1d6885802ce875e3698a6e1ef0d4217ad