Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/05/2023, 19:01
Static task
static1
Behavioral task
behavioral1
Sample
ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec.exe
Resource
win10v2004-20230220-en
General
-
Target
ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec.exe
-
Size
610KB
-
MD5
7c5603106087dcc7cc3a368adc897c20
-
SHA1
9c920528dabef8f691c0d169b6a0b1447f339dde
-
SHA256
ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec
-
SHA512
ba3209ce52c721a412ac6bf04727f0563678c3d11cf31dd82366d8560984929e99811322e64732ba4d4af4651cd6cabd0a23be4694a4a5e30e5d288f18d64dce
-
SSDEEP
6144:emp0yN90QEzRMD7vd/frJe1Yq23hy/gKvXfSEnpVbZMGvGfs5iH9I5TJY2NV:Oy90nMfFrn3haXfSaNhGUid+q2D
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 54220791.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 54220791.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 54220791.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 54220791.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 54220791.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 54220791.exe -
Executes dropped EXE 3 IoCs
pid Process 1680 st072769.exe 1904 54220791.exe 2044 kp868639.exe -
Loads dropped DLL 6 IoCs
pid Process 1528 ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec.exe 1680 st072769.exe 1680 st072769.exe 1680 st072769.exe 1680 st072769.exe 2044 kp868639.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 54220791.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features 54220791.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st072769.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce st072769.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1904 54220791.exe 1904 54220791.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1904 54220791.exe Token: SeDebugPrivilege 2044 kp868639.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1528 wrote to memory of 1680 1528 ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec.exe 28 PID 1528 wrote to memory of 1680 1528 ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec.exe 28 PID 1528 wrote to memory of 1680 1528 ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec.exe 28 PID 1528 wrote to memory of 1680 1528 ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec.exe 28 PID 1528 wrote to memory of 1680 1528 ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec.exe 28 PID 1528 wrote to memory of 1680 1528 ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec.exe 28 PID 1528 wrote to memory of 1680 1528 ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec.exe 28 PID 1680 wrote to memory of 1904 1680 st072769.exe 29 PID 1680 wrote to memory of 1904 1680 st072769.exe 29 PID 1680 wrote to memory of 1904 1680 st072769.exe 29 PID 1680 wrote to memory of 1904 1680 st072769.exe 29 PID 1680 wrote to memory of 1904 1680 st072769.exe 29 PID 1680 wrote to memory of 1904 1680 st072769.exe 29 PID 1680 wrote to memory of 1904 1680 st072769.exe 29 PID 1680 wrote to memory of 2044 1680 st072769.exe 30 PID 1680 wrote to memory of 2044 1680 st072769.exe 30 PID 1680 wrote to memory of 2044 1680 st072769.exe 30 PID 1680 wrote to memory of 2044 1680 st072769.exe 30 PID 1680 wrote to memory of 2044 1680 st072769.exe 30 PID 1680 wrote to memory of 2044 1680 st072769.exe 30 PID 1680 wrote to memory of 2044 1680 st072769.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec.exe"C:\Users\Admin\AppData\Local\Temp\ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st072769.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st072769.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\54220791.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\54220791.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp868639.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp868639.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456KB
MD534706311479bb975b0c3abcb96cf0cbd
SHA1382a3a0cf72be87d860b3d10777eba0376e2ae9e
SHA2563492a8dc569691d340e4b373dee6797a4954c05d57ef2723a5b34bb217b4c49d
SHA512c133b97af694745abd08726d8210032c9bef3e85e25936b1e7c1fd37b791151ee15c21c9410180fdda2f65aab6304af8d889d5fcef4f4773a004c29ffa8b2bdf
-
Filesize
456KB
MD534706311479bb975b0c3abcb96cf0cbd
SHA1382a3a0cf72be87d860b3d10777eba0376e2ae9e
SHA2563492a8dc569691d340e4b373dee6797a4954c05d57ef2723a5b34bb217b4c49d
SHA512c133b97af694745abd08726d8210032c9bef3e85e25936b1e7c1fd37b791151ee15c21c9410180fdda2f65aab6304af8d889d5fcef4f4773a004c29ffa8b2bdf
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
459KB
MD577e9916cf8139c1761cf8155452dddf4
SHA1d69f9e4c1d9a4c9f1d7481a8735efc750c96b105
SHA256d9177fff8d55da7d67aa1f04016b36fbf2ca6cd7f76c14a3c8bd816b0b23039f
SHA51244e86f3d03d19f31c73688182c81f7ac09b23cc0180d56af8efea03de6eb96e0091cc597622c8ff75c93894f28be5d829fe752a17a6556c47cfb1db61262d570
-
Filesize
459KB
MD577e9916cf8139c1761cf8155452dddf4
SHA1d69f9e4c1d9a4c9f1d7481a8735efc750c96b105
SHA256d9177fff8d55da7d67aa1f04016b36fbf2ca6cd7f76c14a3c8bd816b0b23039f
SHA51244e86f3d03d19f31c73688182c81f7ac09b23cc0180d56af8efea03de6eb96e0091cc597622c8ff75c93894f28be5d829fe752a17a6556c47cfb1db61262d570
-
Filesize
459KB
MD577e9916cf8139c1761cf8155452dddf4
SHA1d69f9e4c1d9a4c9f1d7481a8735efc750c96b105
SHA256d9177fff8d55da7d67aa1f04016b36fbf2ca6cd7f76c14a3c8bd816b0b23039f
SHA51244e86f3d03d19f31c73688182c81f7ac09b23cc0180d56af8efea03de6eb96e0091cc597622c8ff75c93894f28be5d829fe752a17a6556c47cfb1db61262d570
-
Filesize
456KB
MD534706311479bb975b0c3abcb96cf0cbd
SHA1382a3a0cf72be87d860b3d10777eba0376e2ae9e
SHA2563492a8dc569691d340e4b373dee6797a4954c05d57ef2723a5b34bb217b4c49d
SHA512c133b97af694745abd08726d8210032c9bef3e85e25936b1e7c1fd37b791151ee15c21c9410180fdda2f65aab6304af8d889d5fcef4f4773a004c29ffa8b2bdf
-
Filesize
456KB
MD534706311479bb975b0c3abcb96cf0cbd
SHA1382a3a0cf72be87d860b3d10777eba0376e2ae9e
SHA2563492a8dc569691d340e4b373dee6797a4954c05d57ef2723a5b34bb217b4c49d
SHA512c133b97af694745abd08726d8210032c9bef3e85e25936b1e7c1fd37b791151ee15c21c9410180fdda2f65aab6304af8d889d5fcef4f4773a004c29ffa8b2bdf
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
459KB
MD577e9916cf8139c1761cf8155452dddf4
SHA1d69f9e4c1d9a4c9f1d7481a8735efc750c96b105
SHA256d9177fff8d55da7d67aa1f04016b36fbf2ca6cd7f76c14a3c8bd816b0b23039f
SHA51244e86f3d03d19f31c73688182c81f7ac09b23cc0180d56af8efea03de6eb96e0091cc597622c8ff75c93894f28be5d829fe752a17a6556c47cfb1db61262d570
-
Filesize
459KB
MD577e9916cf8139c1761cf8155452dddf4
SHA1d69f9e4c1d9a4c9f1d7481a8735efc750c96b105
SHA256d9177fff8d55da7d67aa1f04016b36fbf2ca6cd7f76c14a3c8bd816b0b23039f
SHA51244e86f3d03d19f31c73688182c81f7ac09b23cc0180d56af8efea03de6eb96e0091cc597622c8ff75c93894f28be5d829fe752a17a6556c47cfb1db61262d570
-
Filesize
459KB
MD577e9916cf8139c1761cf8155452dddf4
SHA1d69f9e4c1d9a4c9f1d7481a8735efc750c96b105
SHA256d9177fff8d55da7d67aa1f04016b36fbf2ca6cd7f76c14a3c8bd816b0b23039f
SHA51244e86f3d03d19f31c73688182c81f7ac09b23cc0180d56af8efea03de6eb96e0091cc597622c8ff75c93894f28be5d829fe752a17a6556c47cfb1db61262d570