Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    219s
  • max time network
    281s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2023, 18:55

General

  • Target

    e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe

  • Size

    747KB

  • MD5

    30e510cf8927bd6359adff1cf5745d8f

  • SHA1

    1fef501bb23e0b88a375b0ef064c7d60acab0066

  • SHA256

    e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a

  • SHA512

    f92a6bd90c28edea7cf5916be6f47779b80f4609e13332ddf97d23862170f660c0657fda52cd2b0ccc3e998ada5f2b0176cbacd167f2cb4e1e3b237ef68220a0

  • SSDEEP

    12288:oy90YU612b+HDoEr+UvxJzm5E4paUgzcaXClat7I5bE4w52vok+:oy+612bE8ErhINpMzcaXCsR2bEZn5

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe
    "C:\Users\Admin\AppData\Local\Temp\e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1364
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un904449.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un904449.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:780
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14404042.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14404042.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1864
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk738920.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk738920.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:776

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un904449.exe

    Filesize

    593KB

    MD5

    5e65eb208a869264ff6c450331946dd9

    SHA1

    c25c4fc2c5eb3eeafa9522d255b74a11324f817f

    SHA256

    b32c081be707c35df1bca880e938e789b22f96ea893c5e9917fe09be44cfcffb

    SHA512

    8cb87b3eb8c46412cfa35ee36543804e95c69e7f52e98b1c246d3aa12861721c1eb08d8a5d7f4011c84aeb8fce02f84e6073dec54f5d6605dcf8e9c019698cca

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un904449.exe

    Filesize

    593KB

    MD5

    5e65eb208a869264ff6c450331946dd9

    SHA1

    c25c4fc2c5eb3eeafa9522d255b74a11324f817f

    SHA256

    b32c081be707c35df1bca880e938e789b22f96ea893c5e9917fe09be44cfcffb

    SHA512

    8cb87b3eb8c46412cfa35ee36543804e95c69e7f52e98b1c246d3aa12861721c1eb08d8a5d7f4011c84aeb8fce02f84e6073dec54f5d6605dcf8e9c019698cca

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14404042.exe

    Filesize

    377KB

    MD5

    bf9d9d5ab84e0367272b452cde92a639

    SHA1

    b0fdca54ad78ec4c0046a32e55f66be41f07e681

    SHA256

    9e65d1274577e4aaa99fd17b1510a3482b6a77d90d4f7934343c948a4172d46f

    SHA512

    4b0c40f8f61ef077a39a53deefbf3afd9752c4e7a8536a5665ef3f7370b9801bb36106bbbe51c3ca5e61c9e0f0e4d329d6e130651de5b1cc0f158d07da9df399

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14404042.exe

    Filesize

    377KB

    MD5

    bf9d9d5ab84e0367272b452cde92a639

    SHA1

    b0fdca54ad78ec4c0046a32e55f66be41f07e681

    SHA256

    9e65d1274577e4aaa99fd17b1510a3482b6a77d90d4f7934343c948a4172d46f

    SHA512

    4b0c40f8f61ef077a39a53deefbf3afd9752c4e7a8536a5665ef3f7370b9801bb36106bbbe51c3ca5e61c9e0f0e4d329d6e130651de5b1cc0f158d07da9df399

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14404042.exe

    Filesize

    377KB

    MD5

    bf9d9d5ab84e0367272b452cde92a639

    SHA1

    b0fdca54ad78ec4c0046a32e55f66be41f07e681

    SHA256

    9e65d1274577e4aaa99fd17b1510a3482b6a77d90d4f7934343c948a4172d46f

    SHA512

    4b0c40f8f61ef077a39a53deefbf3afd9752c4e7a8536a5665ef3f7370b9801bb36106bbbe51c3ca5e61c9e0f0e4d329d6e130651de5b1cc0f158d07da9df399

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk738920.exe

    Filesize

    459KB

    MD5

    c0301cc062dac5f03f5aff4e542ee00d

    SHA1

    af73de1bae14d9b41748eef302cab5aad749438b

    SHA256

    76b237154e1a3bab0f42aef13539d3e94e41a2c8fa04ee8d11e3a5fbaeef4118

    SHA512

    f2baecb1a094d2269b48b78540b07b0ca336f3247c59d0b9853e2956ad79f1b193f6922f67228da8614fa3235885b4b74b1cd08fc2d4993e9ab89a5f997599d3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk738920.exe

    Filesize

    459KB

    MD5

    c0301cc062dac5f03f5aff4e542ee00d

    SHA1

    af73de1bae14d9b41748eef302cab5aad749438b

    SHA256

    76b237154e1a3bab0f42aef13539d3e94e41a2c8fa04ee8d11e3a5fbaeef4118

    SHA512

    f2baecb1a094d2269b48b78540b07b0ca336f3247c59d0b9853e2956ad79f1b193f6922f67228da8614fa3235885b4b74b1cd08fc2d4993e9ab89a5f997599d3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk738920.exe

    Filesize

    459KB

    MD5

    c0301cc062dac5f03f5aff4e542ee00d

    SHA1

    af73de1bae14d9b41748eef302cab5aad749438b

    SHA256

    76b237154e1a3bab0f42aef13539d3e94e41a2c8fa04ee8d11e3a5fbaeef4118

    SHA512

    f2baecb1a094d2269b48b78540b07b0ca336f3247c59d0b9853e2956ad79f1b193f6922f67228da8614fa3235885b4b74b1cd08fc2d4993e9ab89a5f997599d3

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un904449.exe

    Filesize

    593KB

    MD5

    5e65eb208a869264ff6c450331946dd9

    SHA1

    c25c4fc2c5eb3eeafa9522d255b74a11324f817f

    SHA256

    b32c081be707c35df1bca880e938e789b22f96ea893c5e9917fe09be44cfcffb

    SHA512

    8cb87b3eb8c46412cfa35ee36543804e95c69e7f52e98b1c246d3aa12861721c1eb08d8a5d7f4011c84aeb8fce02f84e6073dec54f5d6605dcf8e9c019698cca

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un904449.exe

    Filesize

    593KB

    MD5

    5e65eb208a869264ff6c450331946dd9

    SHA1

    c25c4fc2c5eb3eeafa9522d255b74a11324f817f

    SHA256

    b32c081be707c35df1bca880e938e789b22f96ea893c5e9917fe09be44cfcffb

    SHA512

    8cb87b3eb8c46412cfa35ee36543804e95c69e7f52e98b1c246d3aa12861721c1eb08d8a5d7f4011c84aeb8fce02f84e6073dec54f5d6605dcf8e9c019698cca

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\14404042.exe

    Filesize

    377KB

    MD5

    bf9d9d5ab84e0367272b452cde92a639

    SHA1

    b0fdca54ad78ec4c0046a32e55f66be41f07e681

    SHA256

    9e65d1274577e4aaa99fd17b1510a3482b6a77d90d4f7934343c948a4172d46f

    SHA512

    4b0c40f8f61ef077a39a53deefbf3afd9752c4e7a8536a5665ef3f7370b9801bb36106bbbe51c3ca5e61c9e0f0e4d329d6e130651de5b1cc0f158d07da9df399

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\14404042.exe

    Filesize

    377KB

    MD5

    bf9d9d5ab84e0367272b452cde92a639

    SHA1

    b0fdca54ad78ec4c0046a32e55f66be41f07e681

    SHA256

    9e65d1274577e4aaa99fd17b1510a3482b6a77d90d4f7934343c948a4172d46f

    SHA512

    4b0c40f8f61ef077a39a53deefbf3afd9752c4e7a8536a5665ef3f7370b9801bb36106bbbe51c3ca5e61c9e0f0e4d329d6e130651de5b1cc0f158d07da9df399

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\14404042.exe

    Filesize

    377KB

    MD5

    bf9d9d5ab84e0367272b452cde92a639

    SHA1

    b0fdca54ad78ec4c0046a32e55f66be41f07e681

    SHA256

    9e65d1274577e4aaa99fd17b1510a3482b6a77d90d4f7934343c948a4172d46f

    SHA512

    4b0c40f8f61ef077a39a53deefbf3afd9752c4e7a8536a5665ef3f7370b9801bb36106bbbe51c3ca5e61c9e0f0e4d329d6e130651de5b1cc0f158d07da9df399

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk738920.exe

    Filesize

    459KB

    MD5

    c0301cc062dac5f03f5aff4e542ee00d

    SHA1

    af73de1bae14d9b41748eef302cab5aad749438b

    SHA256

    76b237154e1a3bab0f42aef13539d3e94e41a2c8fa04ee8d11e3a5fbaeef4118

    SHA512

    f2baecb1a094d2269b48b78540b07b0ca336f3247c59d0b9853e2956ad79f1b193f6922f67228da8614fa3235885b4b74b1cd08fc2d4993e9ab89a5f997599d3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk738920.exe

    Filesize

    459KB

    MD5

    c0301cc062dac5f03f5aff4e542ee00d

    SHA1

    af73de1bae14d9b41748eef302cab5aad749438b

    SHA256

    76b237154e1a3bab0f42aef13539d3e94e41a2c8fa04ee8d11e3a5fbaeef4118

    SHA512

    f2baecb1a094d2269b48b78540b07b0ca336f3247c59d0b9853e2956ad79f1b193f6922f67228da8614fa3235885b4b74b1cd08fc2d4993e9ab89a5f997599d3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk738920.exe

    Filesize

    459KB

    MD5

    c0301cc062dac5f03f5aff4e542ee00d

    SHA1

    af73de1bae14d9b41748eef302cab5aad749438b

    SHA256

    76b237154e1a3bab0f42aef13539d3e94e41a2c8fa04ee8d11e3a5fbaeef4118

    SHA512

    f2baecb1a094d2269b48b78540b07b0ca336f3247c59d0b9853e2956ad79f1b193f6922f67228da8614fa3235885b4b74b1cd08fc2d4993e9ab89a5f997599d3

  • memory/776-148-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/776-130-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/776-124-0x00000000025E0000-0x000000000261C000-memory.dmp

    Filesize

    240KB

  • memory/776-146-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/776-144-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/776-142-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/776-140-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/776-132-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/776-134-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/776-138-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/776-136-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/776-150-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/776-128-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/776-127-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/776-126-0x0000000000240000-0x0000000000286000-memory.dmp

    Filesize

    280KB

  • memory/776-125-0x0000000002620000-0x000000000265A000-memory.dmp

    Filesize

    232KB

  • memory/776-152-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/776-154-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/776-156-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/776-158-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/776-921-0x0000000004D80000-0x0000000004DC0000-memory.dmp

    Filesize

    256KB

  • memory/776-923-0x0000000004D80000-0x0000000004DC0000-memory.dmp

    Filesize

    256KB

  • memory/1864-84-0x0000000000AE0000-0x0000000000AF2000-memory.dmp

    Filesize

    72KB

  • memory/1864-113-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/1864-111-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/1864-109-0x0000000004FB0000-0x0000000004FF0000-memory.dmp

    Filesize

    256KB

  • memory/1864-110-0x0000000004FB0000-0x0000000004FF0000-memory.dmp

    Filesize

    256KB

  • memory/1864-86-0x0000000000AE0000-0x0000000000AF2000-memory.dmp

    Filesize

    72KB

  • memory/1864-88-0x0000000000AE0000-0x0000000000AF2000-memory.dmp

    Filesize

    72KB

  • memory/1864-90-0x0000000000AE0000-0x0000000000AF2000-memory.dmp

    Filesize

    72KB

  • memory/1864-92-0x0000000000AE0000-0x0000000000AF2000-memory.dmp

    Filesize

    72KB

  • memory/1864-94-0x0000000000AE0000-0x0000000000AF2000-memory.dmp

    Filesize

    72KB

  • memory/1864-96-0x0000000000AE0000-0x0000000000AF2000-memory.dmp

    Filesize

    72KB

  • memory/1864-98-0x0000000000AE0000-0x0000000000AF2000-memory.dmp

    Filesize

    72KB

  • memory/1864-100-0x0000000000AE0000-0x0000000000AF2000-memory.dmp

    Filesize

    72KB

  • memory/1864-102-0x0000000000AE0000-0x0000000000AF2000-memory.dmp

    Filesize

    72KB

  • memory/1864-104-0x0000000000AE0000-0x0000000000AF2000-memory.dmp

    Filesize

    72KB

  • memory/1864-106-0x0000000000AE0000-0x0000000000AF2000-memory.dmp

    Filesize

    72KB

  • memory/1864-108-0x0000000000AE0000-0x0000000000AF2000-memory.dmp

    Filesize

    72KB

  • memory/1864-82-0x0000000000AE0000-0x0000000000AF2000-memory.dmp

    Filesize

    72KB

  • memory/1864-81-0x0000000000AE0000-0x0000000000AF2000-memory.dmp

    Filesize

    72KB

  • memory/1864-80-0x0000000000AE0000-0x0000000000AF8000-memory.dmp

    Filesize

    96KB

  • memory/1864-79-0x00000000003B0000-0x00000000003CA000-memory.dmp

    Filesize

    104KB

  • memory/1864-78-0x00000000002D0000-0x00000000002FD000-memory.dmp

    Filesize

    180KB