Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
240s -
max time network
285s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
c475777b2361308205e150cc95b93d59ea62f7f721f36b0ac1e17a3ae05ecfcc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c475777b2361308205e150cc95b93d59ea62f7f721f36b0ac1e17a3ae05ecfcc.exe
Resource
win10v2004-20230221-en
General
-
Target
c475777b2361308205e150cc95b93d59ea62f7f721f36b0ac1e17a3ae05ecfcc.exe
-
Size
1.5MB
-
MD5
acf5f8ea08344b58eeb8d546b01fe689
-
SHA1
1ed97ea8e34d8af7a5bb36f73ac6145724719f3e
-
SHA256
c475777b2361308205e150cc95b93d59ea62f7f721f36b0ac1e17a3ae05ecfcc
-
SHA512
f4ec7e2a4f407401b3a951ce4fd05f6ed511d834338185a644bbf3fc213efd2451718e7b775734ef7ae822e1223dd91c0d1efb976b220f3d8f1dd73021adbc67
-
SSDEEP
24576:vyT2HQvGlUKcjtn6Rq/++GkO6nvgk6rhABJ7M+Tx/1+ASQmkgOvdmBH9:6KHQvGaKmt6M/JGkOzkhJL/1OGtvc
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 160930046.exe -
Executes dropped EXE 6 IoCs
pid Process 3800 Mc841959.exe 2168 YB093725.exe 1768 md528212.exe 212 160930046.exe 2148 1.exe 2032 232544829.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" md528212.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c475777b2361308205e150cc95b93d59ea62f7f721f36b0ac1e17a3ae05ecfcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c475777b2361308205e150cc95b93d59ea62f7f721f36b0ac1e17a3ae05ecfcc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce Mc841959.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Mc841959.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce YB093725.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" YB093725.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce md528212.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1312 2032 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2148 1.exe 2148 1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 212 160930046.exe Token: SeDebugPrivilege 2148 1.exe Token: SeDebugPrivilege 2032 232544829.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3480 wrote to memory of 3800 3480 c475777b2361308205e150cc95b93d59ea62f7f721f36b0ac1e17a3ae05ecfcc.exe 79 PID 3480 wrote to memory of 3800 3480 c475777b2361308205e150cc95b93d59ea62f7f721f36b0ac1e17a3ae05ecfcc.exe 79 PID 3480 wrote to memory of 3800 3480 c475777b2361308205e150cc95b93d59ea62f7f721f36b0ac1e17a3ae05ecfcc.exe 79 PID 3800 wrote to memory of 2168 3800 Mc841959.exe 80 PID 3800 wrote to memory of 2168 3800 Mc841959.exe 80 PID 3800 wrote to memory of 2168 3800 Mc841959.exe 80 PID 2168 wrote to memory of 1768 2168 YB093725.exe 81 PID 2168 wrote to memory of 1768 2168 YB093725.exe 81 PID 2168 wrote to memory of 1768 2168 YB093725.exe 81 PID 1768 wrote to memory of 212 1768 md528212.exe 82 PID 1768 wrote to memory of 212 1768 md528212.exe 82 PID 1768 wrote to memory of 212 1768 md528212.exe 82 PID 212 wrote to memory of 2148 212 160930046.exe 85 PID 212 wrote to memory of 2148 212 160930046.exe 85 PID 1768 wrote to memory of 2032 1768 md528212.exe 86 PID 1768 wrote to memory of 2032 1768 md528212.exe 86 PID 1768 wrote to memory of 2032 1768 md528212.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\c475777b2361308205e150cc95b93d59ea62f7f721f36b0ac1e17a3ae05ecfcc.exe"C:\Users\Admin\AppData\Local\Temp\c475777b2361308205e150cc95b93d59ea62f7f721f36b0ac1e17a3ae05ecfcc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Mc841959.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Mc841959.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\YB093725.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\YB093725.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\md528212.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\md528212.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\160930046.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\160930046.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\232544829.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\232544829.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 12166⤵
- Program crash
PID:1312
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2032 -ip 20321⤵PID:2232
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5cbd2650dc6926f419dc45124570031f5
SHA11d5d771540c84abcaf4f6ed34f3fc863dd05e635
SHA25626dbbf23c62fd0e70b83592d868314b4872f2c974fdb2ded7959f9003f15f4f0
SHA512aa65ae8ca4884aca1a2504a7ff7e38bd21c28a3164b3e1a7ca1f5e8b2db7eba107f97b145e4e6b70a4dae4fb989fdc59af35ed249d3c64800210ea9504ebdb2d
-
Filesize
1.3MB
MD5cbd2650dc6926f419dc45124570031f5
SHA11d5d771540c84abcaf4f6ed34f3fc863dd05e635
SHA25626dbbf23c62fd0e70b83592d868314b4872f2c974fdb2ded7959f9003f15f4f0
SHA512aa65ae8ca4884aca1a2504a7ff7e38bd21c28a3164b3e1a7ca1f5e8b2db7eba107f97b145e4e6b70a4dae4fb989fdc59af35ed249d3c64800210ea9504ebdb2d
-
Filesize
871KB
MD55e11a9199be548620f50bfbb39ae57a5
SHA1b9ec64624cc920e803b280ec5488f5cbbdbb7ed0
SHA25649b386001f279221e98e13d68c8c39a0605e92314e8e4d71afb4d3576c38c896
SHA512ae3a0041d4bf4225dd53cec41bf0cdfee34318fe390bccf68d8293c27ea9310373b3ef3db830406ebe024dafcf38edfaa641aedd2651a96dd3981dc43d9cfb4c
-
Filesize
871KB
MD55e11a9199be548620f50bfbb39ae57a5
SHA1b9ec64624cc920e803b280ec5488f5cbbdbb7ed0
SHA25649b386001f279221e98e13d68c8c39a0605e92314e8e4d71afb4d3576c38c896
SHA512ae3a0041d4bf4225dd53cec41bf0cdfee34318fe390bccf68d8293c27ea9310373b3ef3db830406ebe024dafcf38edfaa641aedd2651a96dd3981dc43d9cfb4c
-
Filesize
699KB
MD52667b7a6aaaca2c152970c1f1b6b1ecc
SHA10d73792eb5f80b1e02cbdec2dac42a76bec2e7b5
SHA2565846ca77777f213eb81867d0aaadc2fb833d85813924e5d3e15d62833cd9838b
SHA512a0e0299e2dd0ff656332c6af3085de87128737b3279713cf32eee1bb221189fce1036552c94260ae5e28f5c2dd8d142bc0f68d7d74fe3919205bf02557e6b1f2
-
Filesize
699KB
MD52667b7a6aaaca2c152970c1f1b6b1ecc
SHA10d73792eb5f80b1e02cbdec2dac42a76bec2e7b5
SHA2565846ca77777f213eb81867d0aaadc2fb833d85813924e5d3e15d62833cd9838b
SHA512a0e0299e2dd0ff656332c6af3085de87128737b3279713cf32eee1bb221189fce1036552c94260ae5e28f5c2dd8d142bc0f68d7d74fe3919205bf02557e6b1f2
-
Filesize
299KB
MD5abc8f4a5f0f64c809ee9e588e439c7e2
SHA13b876b741ac6f32e6faa42bd78524506bd70433c
SHA256c832258986072da06658b2b339d6d5868bb55a0214ba2c9a97dad97c2cd68b08
SHA51299e26859892ac05482c70bbe2e748d350927c0560ccc7adc024da7bb09c1e31fa0388958479672b3cbce479376b031fa46071f8d6bf2b1cbc5e1be99f9ac1f9c
-
Filesize
299KB
MD5abc8f4a5f0f64c809ee9e588e439c7e2
SHA13b876b741ac6f32e6faa42bd78524506bd70433c
SHA256c832258986072da06658b2b339d6d5868bb55a0214ba2c9a97dad97c2cd68b08
SHA51299e26859892ac05482c70bbe2e748d350927c0560ccc7adc024da7bb09c1e31fa0388958479672b3cbce479376b031fa46071f8d6bf2b1cbc5e1be99f9ac1f9c
-
Filesize
478KB
MD5136efe696ee60fb77acdf8bcb453a6d0
SHA18589c3169109152fe337fc439a955ae48ca5284f
SHA25607582cfb14f022d0d51930596f04ff72fc131265ba47b5a10f378a3b0ff17ee1
SHA5125df8b059d90228e0c0fcde481486a9607758eab499b796b7149a9cd62f4ce6eeaac8d22a3194e2bfc3634587855489b01b0a81e7763f223fb12d7b1553f3ecfe
-
Filesize
478KB
MD5136efe696ee60fb77acdf8bcb453a6d0
SHA18589c3169109152fe337fc439a955ae48ca5284f
SHA25607582cfb14f022d0d51930596f04ff72fc131265ba47b5a10f378a3b0ff17ee1
SHA5125df8b059d90228e0c0fcde481486a9607758eab499b796b7149a9cd62f4ce6eeaac8d22a3194e2bfc3634587855489b01b0a81e7763f223fb12d7b1553f3ecfe
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91