Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 18:41
Static task
static1
Behavioral task
behavioral1
Sample
9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db.exe
Resource
win10v2004-20230220-en
General
-
Target
9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db.exe
-
Size
690KB
-
MD5
f8f94d9fc049a9ccc9be5e9fbdd3f1a9
-
SHA1
dc60384e67de7035339832e31d5139c41479ca26
-
SHA256
9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db
-
SHA512
67329f11acbf62bcde00353c26c2c593e982721184b2cea749bfa3289ecbb39804c4241b9f87568db0cf3505b9361062de5525de8081a70587a5933350510861
-
SSDEEP
12288:4y90L0U8VB5KOE0F6cSDKYyWIziAYom00qX2KmB194k17/Y:4yhU8VTKT0Ik2AY9g2KYDTjY
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 58392694.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 58392694.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 58392694.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 58392694.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 58392694.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 58392694.exe -
Executes dropped EXE 3 IoCs
pid Process 1764 un720969.exe 1028 58392694.exe 1664 rk103705.exe -
Loads dropped DLL 8 IoCs
pid Process 1228 9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db.exe 1764 un720969.exe 1764 un720969.exe 1764 un720969.exe 1028 58392694.exe 1764 un720969.exe 1764 un720969.exe 1664 rk103705.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 58392694.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 58392694.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un720969.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un720969.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1028 58392694.exe 1028 58392694.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1028 58392694.exe Token: SeDebugPrivilege 1664 rk103705.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1228 wrote to memory of 1764 1228 9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db.exe 28 PID 1228 wrote to memory of 1764 1228 9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db.exe 28 PID 1228 wrote to memory of 1764 1228 9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db.exe 28 PID 1228 wrote to memory of 1764 1228 9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db.exe 28 PID 1228 wrote to memory of 1764 1228 9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db.exe 28 PID 1228 wrote to memory of 1764 1228 9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db.exe 28 PID 1228 wrote to memory of 1764 1228 9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db.exe 28 PID 1764 wrote to memory of 1028 1764 un720969.exe 29 PID 1764 wrote to memory of 1028 1764 un720969.exe 29 PID 1764 wrote to memory of 1028 1764 un720969.exe 29 PID 1764 wrote to memory of 1028 1764 un720969.exe 29 PID 1764 wrote to memory of 1028 1764 un720969.exe 29 PID 1764 wrote to memory of 1028 1764 un720969.exe 29 PID 1764 wrote to memory of 1028 1764 un720969.exe 29 PID 1764 wrote to memory of 1664 1764 un720969.exe 30 PID 1764 wrote to memory of 1664 1764 un720969.exe 30 PID 1764 wrote to memory of 1664 1764 un720969.exe 30 PID 1764 wrote to memory of 1664 1764 un720969.exe 30 PID 1764 wrote to memory of 1664 1764 un720969.exe 30 PID 1764 wrote to memory of 1664 1764 un720969.exe 30 PID 1764 wrote to memory of 1664 1764 un720969.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db.exe"C:\Users\Admin\AppData\Local\Temp\9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un720969.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un720969.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\58392694.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\58392694.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk103705.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk103705.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5b17a5eb94041f4dde9825f8f2d378711
SHA17c05b63f81de92fd917e9b5a4eacdfd5dd7847ca
SHA256a5c8e5ac3f8bd5c9dc758ce436fc62e497c2ce941a8d02e2d5c44758e1295eb5
SHA512bd2240d5a476d588521cc8ff72fa8967c0f2a1852d7ab19eb30162e28bf55e99eb6949321be1e22b19685c7d92c8b9ff3295cf12a313aa95ca3d1182289ebcc8
-
Filesize
536KB
MD5b17a5eb94041f4dde9825f8f2d378711
SHA17c05b63f81de92fd917e9b5a4eacdfd5dd7847ca
SHA256a5c8e5ac3f8bd5c9dc758ce436fc62e497c2ce941a8d02e2d5c44758e1295eb5
SHA512bd2240d5a476d588521cc8ff72fa8967c0f2a1852d7ab19eb30162e28bf55e99eb6949321be1e22b19685c7d92c8b9ff3295cf12a313aa95ca3d1182289ebcc8
-
Filesize
259KB
MD50ffe894137924ea28e396ca5523d5f2f
SHA197569cea2cf7314150c6b499671ec93317e382a0
SHA256e04e03ddd14141abe3b7249f8885d1a9243c3981cae3b657e4196b15412f705a
SHA512893fad59d0f32eb8bd485ae1415c9a96e26953821314fc584cdafbd5cf09d40dcf89271a333d511f911ecad34465e8234da3474bb2b02863ed4f79b5dd3e44c3
-
Filesize
259KB
MD50ffe894137924ea28e396ca5523d5f2f
SHA197569cea2cf7314150c6b499671ec93317e382a0
SHA256e04e03ddd14141abe3b7249f8885d1a9243c3981cae3b657e4196b15412f705a
SHA512893fad59d0f32eb8bd485ae1415c9a96e26953821314fc584cdafbd5cf09d40dcf89271a333d511f911ecad34465e8234da3474bb2b02863ed4f79b5dd3e44c3
-
Filesize
259KB
MD50ffe894137924ea28e396ca5523d5f2f
SHA197569cea2cf7314150c6b499671ec93317e382a0
SHA256e04e03ddd14141abe3b7249f8885d1a9243c3981cae3b657e4196b15412f705a
SHA512893fad59d0f32eb8bd485ae1415c9a96e26953821314fc584cdafbd5cf09d40dcf89271a333d511f911ecad34465e8234da3474bb2b02863ed4f79b5dd3e44c3
-
Filesize
341KB
MD503bd2aa6d7e42cbefe47d2255205f155
SHA153ca51eedb3c598b620d8f1aa479d928e0bb59b3
SHA25632a3acfacdb23aad64ce33a8ffc660b6a0285d0b3b1f8ebf147dcc5d35fa77b2
SHA51281afaacd9b76f41af5fb59bb3743fac53ecd75d88ad9a5e29eab58df396b457c88d1e5c322d183d58e9661b22b5be0621e8161f71fdfc049734d0ed8e7dcd00f
-
Filesize
341KB
MD503bd2aa6d7e42cbefe47d2255205f155
SHA153ca51eedb3c598b620d8f1aa479d928e0bb59b3
SHA25632a3acfacdb23aad64ce33a8ffc660b6a0285d0b3b1f8ebf147dcc5d35fa77b2
SHA51281afaacd9b76f41af5fb59bb3743fac53ecd75d88ad9a5e29eab58df396b457c88d1e5c322d183d58e9661b22b5be0621e8161f71fdfc049734d0ed8e7dcd00f
-
Filesize
341KB
MD503bd2aa6d7e42cbefe47d2255205f155
SHA153ca51eedb3c598b620d8f1aa479d928e0bb59b3
SHA25632a3acfacdb23aad64ce33a8ffc660b6a0285d0b3b1f8ebf147dcc5d35fa77b2
SHA51281afaacd9b76f41af5fb59bb3743fac53ecd75d88ad9a5e29eab58df396b457c88d1e5c322d183d58e9661b22b5be0621e8161f71fdfc049734d0ed8e7dcd00f
-
Filesize
536KB
MD5b17a5eb94041f4dde9825f8f2d378711
SHA17c05b63f81de92fd917e9b5a4eacdfd5dd7847ca
SHA256a5c8e5ac3f8bd5c9dc758ce436fc62e497c2ce941a8d02e2d5c44758e1295eb5
SHA512bd2240d5a476d588521cc8ff72fa8967c0f2a1852d7ab19eb30162e28bf55e99eb6949321be1e22b19685c7d92c8b9ff3295cf12a313aa95ca3d1182289ebcc8
-
Filesize
536KB
MD5b17a5eb94041f4dde9825f8f2d378711
SHA17c05b63f81de92fd917e9b5a4eacdfd5dd7847ca
SHA256a5c8e5ac3f8bd5c9dc758ce436fc62e497c2ce941a8d02e2d5c44758e1295eb5
SHA512bd2240d5a476d588521cc8ff72fa8967c0f2a1852d7ab19eb30162e28bf55e99eb6949321be1e22b19685c7d92c8b9ff3295cf12a313aa95ca3d1182289ebcc8
-
Filesize
259KB
MD50ffe894137924ea28e396ca5523d5f2f
SHA197569cea2cf7314150c6b499671ec93317e382a0
SHA256e04e03ddd14141abe3b7249f8885d1a9243c3981cae3b657e4196b15412f705a
SHA512893fad59d0f32eb8bd485ae1415c9a96e26953821314fc584cdafbd5cf09d40dcf89271a333d511f911ecad34465e8234da3474bb2b02863ed4f79b5dd3e44c3
-
Filesize
259KB
MD50ffe894137924ea28e396ca5523d5f2f
SHA197569cea2cf7314150c6b499671ec93317e382a0
SHA256e04e03ddd14141abe3b7249f8885d1a9243c3981cae3b657e4196b15412f705a
SHA512893fad59d0f32eb8bd485ae1415c9a96e26953821314fc584cdafbd5cf09d40dcf89271a333d511f911ecad34465e8234da3474bb2b02863ed4f79b5dd3e44c3
-
Filesize
259KB
MD50ffe894137924ea28e396ca5523d5f2f
SHA197569cea2cf7314150c6b499671ec93317e382a0
SHA256e04e03ddd14141abe3b7249f8885d1a9243c3981cae3b657e4196b15412f705a
SHA512893fad59d0f32eb8bd485ae1415c9a96e26953821314fc584cdafbd5cf09d40dcf89271a333d511f911ecad34465e8234da3474bb2b02863ed4f79b5dd3e44c3
-
Filesize
341KB
MD503bd2aa6d7e42cbefe47d2255205f155
SHA153ca51eedb3c598b620d8f1aa479d928e0bb59b3
SHA25632a3acfacdb23aad64ce33a8ffc660b6a0285d0b3b1f8ebf147dcc5d35fa77b2
SHA51281afaacd9b76f41af5fb59bb3743fac53ecd75d88ad9a5e29eab58df396b457c88d1e5c322d183d58e9661b22b5be0621e8161f71fdfc049734d0ed8e7dcd00f
-
Filesize
341KB
MD503bd2aa6d7e42cbefe47d2255205f155
SHA153ca51eedb3c598b620d8f1aa479d928e0bb59b3
SHA25632a3acfacdb23aad64ce33a8ffc660b6a0285d0b3b1f8ebf147dcc5d35fa77b2
SHA51281afaacd9b76f41af5fb59bb3743fac53ecd75d88ad9a5e29eab58df396b457c88d1e5c322d183d58e9661b22b5be0621e8161f71fdfc049734d0ed8e7dcd00f
-
Filesize
341KB
MD503bd2aa6d7e42cbefe47d2255205f155
SHA153ca51eedb3c598b620d8f1aa479d928e0bb59b3
SHA25632a3acfacdb23aad64ce33a8ffc660b6a0285d0b3b1f8ebf147dcc5d35fa77b2
SHA51281afaacd9b76f41af5fb59bb3743fac53ecd75d88ad9a5e29eab58df396b457c88d1e5c322d183d58e9661b22b5be0621e8161f71fdfc049734d0ed8e7dcd00f