Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
219s -
max time network
281s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/05/2023, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe
Resource
win10v2004-20230220-en
General
-
Target
e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe
-
Size
747KB
-
MD5
30e510cf8927bd6359adff1cf5745d8f
-
SHA1
1fef501bb23e0b88a375b0ef064c7d60acab0066
-
SHA256
e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a
-
SHA512
f92a6bd90c28edea7cf5916be6f47779b80f4609e13332ddf97d23862170f660c0657fda52cd2b0ccc3e998ada5f2b0176cbacd167f2cb4e1e3b237ef68220a0
-
SSDEEP
12288:oy90YU612b+HDoEr+UvxJzm5E4paUgzcaXClat7I5bE4w52vok+:oy+612bE8ErhINpMzcaXCsR2bEZn5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 14404042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 14404042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 14404042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 14404042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 14404042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 14404042.exe -
Executes dropped EXE 3 IoCs
pid Process 780 un904449.exe 1864 14404042.exe 776 rk738920.exe -
Loads dropped DLL 8 IoCs
pid Process 1364 e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe 780 un904449.exe 780 un904449.exe 780 un904449.exe 1864 14404042.exe 780 un904449.exe 780 un904449.exe 776 rk738920.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 14404042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 14404042.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un904449.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un904449.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1864 14404042.exe 1864 14404042.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1864 14404042.exe Token: SeDebugPrivilege 776 rk738920.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1364 wrote to memory of 780 1364 e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe 28 PID 1364 wrote to memory of 780 1364 e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe 28 PID 1364 wrote to memory of 780 1364 e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe 28 PID 1364 wrote to memory of 780 1364 e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe 28 PID 1364 wrote to memory of 780 1364 e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe 28 PID 1364 wrote to memory of 780 1364 e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe 28 PID 1364 wrote to memory of 780 1364 e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe 28 PID 780 wrote to memory of 1864 780 un904449.exe 29 PID 780 wrote to memory of 1864 780 un904449.exe 29 PID 780 wrote to memory of 1864 780 un904449.exe 29 PID 780 wrote to memory of 1864 780 un904449.exe 29 PID 780 wrote to memory of 1864 780 un904449.exe 29 PID 780 wrote to memory of 1864 780 un904449.exe 29 PID 780 wrote to memory of 1864 780 un904449.exe 29 PID 780 wrote to memory of 776 780 un904449.exe 30 PID 780 wrote to memory of 776 780 un904449.exe 30 PID 780 wrote to memory of 776 780 un904449.exe 30 PID 780 wrote to memory of 776 780 un904449.exe 30 PID 780 wrote to memory of 776 780 un904449.exe 30 PID 780 wrote to memory of 776 780 un904449.exe 30 PID 780 wrote to memory of 776 780 un904449.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe"C:\Users\Admin\AppData\Local\Temp\e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un904449.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un904449.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14404042.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14404042.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk738920.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk738920.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD55e65eb208a869264ff6c450331946dd9
SHA1c25c4fc2c5eb3eeafa9522d255b74a11324f817f
SHA256b32c081be707c35df1bca880e938e789b22f96ea893c5e9917fe09be44cfcffb
SHA5128cb87b3eb8c46412cfa35ee36543804e95c69e7f52e98b1c246d3aa12861721c1eb08d8a5d7f4011c84aeb8fce02f84e6073dec54f5d6605dcf8e9c019698cca
-
Filesize
593KB
MD55e65eb208a869264ff6c450331946dd9
SHA1c25c4fc2c5eb3eeafa9522d255b74a11324f817f
SHA256b32c081be707c35df1bca880e938e789b22f96ea893c5e9917fe09be44cfcffb
SHA5128cb87b3eb8c46412cfa35ee36543804e95c69e7f52e98b1c246d3aa12861721c1eb08d8a5d7f4011c84aeb8fce02f84e6073dec54f5d6605dcf8e9c019698cca
-
Filesize
377KB
MD5bf9d9d5ab84e0367272b452cde92a639
SHA1b0fdca54ad78ec4c0046a32e55f66be41f07e681
SHA2569e65d1274577e4aaa99fd17b1510a3482b6a77d90d4f7934343c948a4172d46f
SHA5124b0c40f8f61ef077a39a53deefbf3afd9752c4e7a8536a5665ef3f7370b9801bb36106bbbe51c3ca5e61c9e0f0e4d329d6e130651de5b1cc0f158d07da9df399
-
Filesize
377KB
MD5bf9d9d5ab84e0367272b452cde92a639
SHA1b0fdca54ad78ec4c0046a32e55f66be41f07e681
SHA2569e65d1274577e4aaa99fd17b1510a3482b6a77d90d4f7934343c948a4172d46f
SHA5124b0c40f8f61ef077a39a53deefbf3afd9752c4e7a8536a5665ef3f7370b9801bb36106bbbe51c3ca5e61c9e0f0e4d329d6e130651de5b1cc0f158d07da9df399
-
Filesize
377KB
MD5bf9d9d5ab84e0367272b452cde92a639
SHA1b0fdca54ad78ec4c0046a32e55f66be41f07e681
SHA2569e65d1274577e4aaa99fd17b1510a3482b6a77d90d4f7934343c948a4172d46f
SHA5124b0c40f8f61ef077a39a53deefbf3afd9752c4e7a8536a5665ef3f7370b9801bb36106bbbe51c3ca5e61c9e0f0e4d329d6e130651de5b1cc0f158d07da9df399
-
Filesize
459KB
MD5c0301cc062dac5f03f5aff4e542ee00d
SHA1af73de1bae14d9b41748eef302cab5aad749438b
SHA25676b237154e1a3bab0f42aef13539d3e94e41a2c8fa04ee8d11e3a5fbaeef4118
SHA512f2baecb1a094d2269b48b78540b07b0ca336f3247c59d0b9853e2956ad79f1b193f6922f67228da8614fa3235885b4b74b1cd08fc2d4993e9ab89a5f997599d3
-
Filesize
459KB
MD5c0301cc062dac5f03f5aff4e542ee00d
SHA1af73de1bae14d9b41748eef302cab5aad749438b
SHA25676b237154e1a3bab0f42aef13539d3e94e41a2c8fa04ee8d11e3a5fbaeef4118
SHA512f2baecb1a094d2269b48b78540b07b0ca336f3247c59d0b9853e2956ad79f1b193f6922f67228da8614fa3235885b4b74b1cd08fc2d4993e9ab89a5f997599d3
-
Filesize
459KB
MD5c0301cc062dac5f03f5aff4e542ee00d
SHA1af73de1bae14d9b41748eef302cab5aad749438b
SHA25676b237154e1a3bab0f42aef13539d3e94e41a2c8fa04ee8d11e3a5fbaeef4118
SHA512f2baecb1a094d2269b48b78540b07b0ca336f3247c59d0b9853e2956ad79f1b193f6922f67228da8614fa3235885b4b74b1cd08fc2d4993e9ab89a5f997599d3
-
Filesize
593KB
MD55e65eb208a869264ff6c450331946dd9
SHA1c25c4fc2c5eb3eeafa9522d255b74a11324f817f
SHA256b32c081be707c35df1bca880e938e789b22f96ea893c5e9917fe09be44cfcffb
SHA5128cb87b3eb8c46412cfa35ee36543804e95c69e7f52e98b1c246d3aa12861721c1eb08d8a5d7f4011c84aeb8fce02f84e6073dec54f5d6605dcf8e9c019698cca
-
Filesize
593KB
MD55e65eb208a869264ff6c450331946dd9
SHA1c25c4fc2c5eb3eeafa9522d255b74a11324f817f
SHA256b32c081be707c35df1bca880e938e789b22f96ea893c5e9917fe09be44cfcffb
SHA5128cb87b3eb8c46412cfa35ee36543804e95c69e7f52e98b1c246d3aa12861721c1eb08d8a5d7f4011c84aeb8fce02f84e6073dec54f5d6605dcf8e9c019698cca
-
Filesize
377KB
MD5bf9d9d5ab84e0367272b452cde92a639
SHA1b0fdca54ad78ec4c0046a32e55f66be41f07e681
SHA2569e65d1274577e4aaa99fd17b1510a3482b6a77d90d4f7934343c948a4172d46f
SHA5124b0c40f8f61ef077a39a53deefbf3afd9752c4e7a8536a5665ef3f7370b9801bb36106bbbe51c3ca5e61c9e0f0e4d329d6e130651de5b1cc0f158d07da9df399
-
Filesize
377KB
MD5bf9d9d5ab84e0367272b452cde92a639
SHA1b0fdca54ad78ec4c0046a32e55f66be41f07e681
SHA2569e65d1274577e4aaa99fd17b1510a3482b6a77d90d4f7934343c948a4172d46f
SHA5124b0c40f8f61ef077a39a53deefbf3afd9752c4e7a8536a5665ef3f7370b9801bb36106bbbe51c3ca5e61c9e0f0e4d329d6e130651de5b1cc0f158d07da9df399
-
Filesize
377KB
MD5bf9d9d5ab84e0367272b452cde92a639
SHA1b0fdca54ad78ec4c0046a32e55f66be41f07e681
SHA2569e65d1274577e4aaa99fd17b1510a3482b6a77d90d4f7934343c948a4172d46f
SHA5124b0c40f8f61ef077a39a53deefbf3afd9752c4e7a8536a5665ef3f7370b9801bb36106bbbe51c3ca5e61c9e0f0e4d329d6e130651de5b1cc0f158d07da9df399
-
Filesize
459KB
MD5c0301cc062dac5f03f5aff4e542ee00d
SHA1af73de1bae14d9b41748eef302cab5aad749438b
SHA25676b237154e1a3bab0f42aef13539d3e94e41a2c8fa04ee8d11e3a5fbaeef4118
SHA512f2baecb1a094d2269b48b78540b07b0ca336f3247c59d0b9853e2956ad79f1b193f6922f67228da8614fa3235885b4b74b1cd08fc2d4993e9ab89a5f997599d3
-
Filesize
459KB
MD5c0301cc062dac5f03f5aff4e542ee00d
SHA1af73de1bae14d9b41748eef302cab5aad749438b
SHA25676b237154e1a3bab0f42aef13539d3e94e41a2c8fa04ee8d11e3a5fbaeef4118
SHA512f2baecb1a094d2269b48b78540b07b0ca336f3247c59d0b9853e2956ad79f1b193f6922f67228da8614fa3235885b4b74b1cd08fc2d4993e9ab89a5f997599d3
-
Filesize
459KB
MD5c0301cc062dac5f03f5aff4e542ee00d
SHA1af73de1bae14d9b41748eef302cab5aad749438b
SHA25676b237154e1a3bab0f42aef13539d3e94e41a2c8fa04ee8d11e3a5fbaeef4118
SHA512f2baecb1a094d2269b48b78540b07b0ca336f3247c59d0b9853e2956ad79f1b193f6922f67228da8614fa3235885b4b74b1cd08fc2d4993e9ab89a5f997599d3