Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/05/2023, 19:16
Static task
static1
Behavioral task
behavioral1
Sample
f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc.exe
Resource
win10v2004-20230220-en
General
-
Target
f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc.exe
-
Size
695KB
-
MD5
8980a9db3873b3dc19cb280771636d2c
-
SHA1
fe12c476cbac5048ee14d95fbbde435aa5cca59a
-
SHA256
f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc
-
SHA512
7c040129a03f22c0eff9b05aeab9368fa98c7fa6e11385cdb3d2a5ad64a678790c102faa7f78ef4d64ace54f5387659c799b164feae02d31af01a38b79ebb48a
-
SSDEEP
12288:ny90+3BuJmBGuO/sz/+tZ9COJq9Imxr8ZXLWT6rD18bAKdA+u3TCk:ny/uJRqz/+tXCVb6m6rD18bAuCCk
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 77251448.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 77251448.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 77251448.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 77251448.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 77251448.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 77251448.exe -
Executes dropped EXE 3 IoCs
pid Process 1968 un982593.exe 588 77251448.exe 1708 rk023796.exe -
Loads dropped DLL 8 IoCs
pid Process 1948 f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc.exe 1968 un982593.exe 1968 un982593.exe 1968 un982593.exe 588 77251448.exe 1968 un982593.exe 1968 un982593.exe 1708 rk023796.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 77251448.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 77251448.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un982593.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un982593.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 588 77251448.exe 588 77251448.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 588 77251448.exe Token: SeDebugPrivilege 1708 rk023796.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1968 1948 f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc.exe 28 PID 1948 wrote to memory of 1968 1948 f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc.exe 28 PID 1948 wrote to memory of 1968 1948 f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc.exe 28 PID 1948 wrote to memory of 1968 1948 f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc.exe 28 PID 1948 wrote to memory of 1968 1948 f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc.exe 28 PID 1948 wrote to memory of 1968 1948 f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc.exe 28 PID 1948 wrote to memory of 1968 1948 f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc.exe 28 PID 1968 wrote to memory of 588 1968 un982593.exe 29 PID 1968 wrote to memory of 588 1968 un982593.exe 29 PID 1968 wrote to memory of 588 1968 un982593.exe 29 PID 1968 wrote to memory of 588 1968 un982593.exe 29 PID 1968 wrote to memory of 588 1968 un982593.exe 29 PID 1968 wrote to memory of 588 1968 un982593.exe 29 PID 1968 wrote to memory of 588 1968 un982593.exe 29 PID 1968 wrote to memory of 1708 1968 un982593.exe 30 PID 1968 wrote to memory of 1708 1968 un982593.exe 30 PID 1968 wrote to memory of 1708 1968 un982593.exe 30 PID 1968 wrote to memory of 1708 1968 un982593.exe 30 PID 1968 wrote to memory of 1708 1968 un982593.exe 30 PID 1968 wrote to memory of 1708 1968 un982593.exe 30 PID 1968 wrote to memory of 1708 1968 un982593.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc.exe"C:\Users\Admin\AppData\Local\Temp\f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un982593.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un982593.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77251448.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77251448.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:588
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk023796.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk023796.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541KB
MD5dc4e4d669ee667f9e50e7d383986e1b1
SHA16399d21ad94d2d3e97c4a98fa532ff5fca124071
SHA256535cdbc4879e81356d3c9e1d83b414c3f39e6c29a618a4cd2af99125f8f3879e
SHA51298e7d7820d9676b26762b7b51b1db5dbf9ac96e9186d801c010cade987ed391e191e80fb5aeab816b4310558c5c55557fb6c7b8688d3116efb9f4708ed669768
-
Filesize
541KB
MD5dc4e4d669ee667f9e50e7d383986e1b1
SHA16399d21ad94d2d3e97c4a98fa532ff5fca124071
SHA256535cdbc4879e81356d3c9e1d83b414c3f39e6c29a618a4cd2af99125f8f3879e
SHA51298e7d7820d9676b26762b7b51b1db5dbf9ac96e9186d801c010cade987ed391e191e80fb5aeab816b4310558c5c55557fb6c7b8688d3116efb9f4708ed669768
-
Filesize
258KB
MD5b582c4713bac7e1aaa73285697222f6e
SHA1753dfa5a18857b743aee7405c22f7b0987d23450
SHA2568228ec55b8360cc0895a320912c970155316ebfccc5fe4efb0647c69f507eb1d
SHA512a24ca97130602fd2cac94ae04e44af51aa3f538c12dc1528db200daf50f1c40b4fe883a6d4f7d8bfbae0505b8df43b396d72b2d4c0baebb43822776c3ec3cf65
-
Filesize
258KB
MD5b582c4713bac7e1aaa73285697222f6e
SHA1753dfa5a18857b743aee7405c22f7b0987d23450
SHA2568228ec55b8360cc0895a320912c970155316ebfccc5fe4efb0647c69f507eb1d
SHA512a24ca97130602fd2cac94ae04e44af51aa3f538c12dc1528db200daf50f1c40b4fe883a6d4f7d8bfbae0505b8df43b396d72b2d4c0baebb43822776c3ec3cf65
-
Filesize
258KB
MD5b582c4713bac7e1aaa73285697222f6e
SHA1753dfa5a18857b743aee7405c22f7b0987d23450
SHA2568228ec55b8360cc0895a320912c970155316ebfccc5fe4efb0647c69f507eb1d
SHA512a24ca97130602fd2cac94ae04e44af51aa3f538c12dc1528db200daf50f1c40b4fe883a6d4f7d8bfbae0505b8df43b396d72b2d4c0baebb43822776c3ec3cf65
-
Filesize
340KB
MD56b2882ac5118675e8ea83cd62887c449
SHA1473b8579fd1f46e01d951b547790004fa718534a
SHA2569490d92fe152c6af45eee9569ad9cbd46b38127bc2670527bd72ca8a30a02e4b
SHA512961877dba91efe6c53d93f4df461b2dae7dd1caa575294610fea1b795c41cb61d750a31fd3327785b3231a20c66637ee9b5b83ec2c85d10e9800cb4b2b091ce4
-
Filesize
340KB
MD56b2882ac5118675e8ea83cd62887c449
SHA1473b8579fd1f46e01d951b547790004fa718534a
SHA2569490d92fe152c6af45eee9569ad9cbd46b38127bc2670527bd72ca8a30a02e4b
SHA512961877dba91efe6c53d93f4df461b2dae7dd1caa575294610fea1b795c41cb61d750a31fd3327785b3231a20c66637ee9b5b83ec2c85d10e9800cb4b2b091ce4
-
Filesize
340KB
MD56b2882ac5118675e8ea83cd62887c449
SHA1473b8579fd1f46e01d951b547790004fa718534a
SHA2569490d92fe152c6af45eee9569ad9cbd46b38127bc2670527bd72ca8a30a02e4b
SHA512961877dba91efe6c53d93f4df461b2dae7dd1caa575294610fea1b795c41cb61d750a31fd3327785b3231a20c66637ee9b5b83ec2c85d10e9800cb4b2b091ce4
-
Filesize
541KB
MD5dc4e4d669ee667f9e50e7d383986e1b1
SHA16399d21ad94d2d3e97c4a98fa532ff5fca124071
SHA256535cdbc4879e81356d3c9e1d83b414c3f39e6c29a618a4cd2af99125f8f3879e
SHA51298e7d7820d9676b26762b7b51b1db5dbf9ac96e9186d801c010cade987ed391e191e80fb5aeab816b4310558c5c55557fb6c7b8688d3116efb9f4708ed669768
-
Filesize
541KB
MD5dc4e4d669ee667f9e50e7d383986e1b1
SHA16399d21ad94d2d3e97c4a98fa532ff5fca124071
SHA256535cdbc4879e81356d3c9e1d83b414c3f39e6c29a618a4cd2af99125f8f3879e
SHA51298e7d7820d9676b26762b7b51b1db5dbf9ac96e9186d801c010cade987ed391e191e80fb5aeab816b4310558c5c55557fb6c7b8688d3116efb9f4708ed669768
-
Filesize
258KB
MD5b582c4713bac7e1aaa73285697222f6e
SHA1753dfa5a18857b743aee7405c22f7b0987d23450
SHA2568228ec55b8360cc0895a320912c970155316ebfccc5fe4efb0647c69f507eb1d
SHA512a24ca97130602fd2cac94ae04e44af51aa3f538c12dc1528db200daf50f1c40b4fe883a6d4f7d8bfbae0505b8df43b396d72b2d4c0baebb43822776c3ec3cf65
-
Filesize
258KB
MD5b582c4713bac7e1aaa73285697222f6e
SHA1753dfa5a18857b743aee7405c22f7b0987d23450
SHA2568228ec55b8360cc0895a320912c970155316ebfccc5fe4efb0647c69f507eb1d
SHA512a24ca97130602fd2cac94ae04e44af51aa3f538c12dc1528db200daf50f1c40b4fe883a6d4f7d8bfbae0505b8df43b396d72b2d4c0baebb43822776c3ec3cf65
-
Filesize
258KB
MD5b582c4713bac7e1aaa73285697222f6e
SHA1753dfa5a18857b743aee7405c22f7b0987d23450
SHA2568228ec55b8360cc0895a320912c970155316ebfccc5fe4efb0647c69f507eb1d
SHA512a24ca97130602fd2cac94ae04e44af51aa3f538c12dc1528db200daf50f1c40b4fe883a6d4f7d8bfbae0505b8df43b396d72b2d4c0baebb43822776c3ec3cf65
-
Filesize
340KB
MD56b2882ac5118675e8ea83cd62887c449
SHA1473b8579fd1f46e01d951b547790004fa718534a
SHA2569490d92fe152c6af45eee9569ad9cbd46b38127bc2670527bd72ca8a30a02e4b
SHA512961877dba91efe6c53d93f4df461b2dae7dd1caa575294610fea1b795c41cb61d750a31fd3327785b3231a20c66637ee9b5b83ec2c85d10e9800cb4b2b091ce4
-
Filesize
340KB
MD56b2882ac5118675e8ea83cd62887c449
SHA1473b8579fd1f46e01d951b547790004fa718534a
SHA2569490d92fe152c6af45eee9569ad9cbd46b38127bc2670527bd72ca8a30a02e4b
SHA512961877dba91efe6c53d93f4df461b2dae7dd1caa575294610fea1b795c41cb61d750a31fd3327785b3231a20c66637ee9b5b83ec2c85d10e9800cb4b2b091ce4
-
Filesize
340KB
MD56b2882ac5118675e8ea83cd62887c449
SHA1473b8579fd1f46e01d951b547790004fa718534a
SHA2569490d92fe152c6af45eee9569ad9cbd46b38127bc2670527bd72ca8a30a02e4b
SHA512961877dba91efe6c53d93f4df461b2dae7dd1caa575294610fea1b795c41cb61d750a31fd3327785b3231a20c66637ee9b5b83ec2c85d10e9800cb4b2b091ce4