Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 18:41 UTC

General

  • Target

    9d8e2b7fe96f5fac74717f3c3eddd7a3348294a0ab34a7850dba7879b9eaca09.exe

  • Size

    651KB

  • MD5

    bc7af4eeda3ba6cdc19bf6ab20393253

  • SHA1

    8625756e9f1913ed58f3dc01c67ca1a20433e406

  • SHA256

    9d8e2b7fe96f5fac74717f3c3eddd7a3348294a0ab34a7850dba7879b9eaca09

  • SHA512

    e861e090b440c8c293da3f0da02d98a1b1d19a67388850795b567eda2e5b8674a75dcc88294d66d5059f2eefadc11f35b47792de4e02c41ed58b9baf01e43e3d

  • SSDEEP

    12288:8y90SAgLHtmU2ptJ/Pxug6iJ4y/n0l//28mQWnvyYU:8yFxJ2ptJ/PxugnUX285WnvyYU

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d8e2b7fe96f5fac74717f3c3eddd7a3348294a0ab34a7850dba7879b9eaca09.exe
    "C:\Users\Admin\AppData\Local\Temp\9d8e2b7fe96f5fac74717f3c3eddd7a3348294a0ab34a7850dba7879b9eaca09.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st526346.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st526346.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1616
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\28439349.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\28439349.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:460
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp866797.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp866797.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:920

Network

    No results found
  • 185.161.248.143:38452
    kp866797.exe
    152 B
    3
  • 185.161.248.143:38452
    kp866797.exe
    152 B
    3
  • 185.161.248.143:38452
    kp866797.exe
    152 B
    3
  • 185.161.248.143:38452
    kp866797.exe
    152 B
    3
No results found

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st526346.exe

    Filesize

    497KB

    MD5

    0bf36d1dfb33416b731b2551fd3aa99f

    SHA1

    7236143b697cdafc0dd33bca3b37545e09e9ee73

    SHA256

    6e11d2b17a85a9a7fa88a801cd10252d3d3539245e6df45ae7d4ecf07a06d1d7

    SHA512

    0101b703f72fcd389a0196535b1420aaca3ac8c4e90a7bcaa2463931fcbe106547720e211c5a556227a13b9dc16ff8c46f9676fa6d8e2ae701739b7e8a75aa1f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st526346.exe

    Filesize

    497KB

    MD5

    0bf36d1dfb33416b731b2551fd3aa99f

    SHA1

    7236143b697cdafc0dd33bca3b37545e09e9ee73

    SHA256

    6e11d2b17a85a9a7fa88a801cd10252d3d3539245e6df45ae7d4ecf07a06d1d7

    SHA512

    0101b703f72fcd389a0196535b1420aaca3ac8c4e90a7bcaa2463931fcbe106547720e211c5a556227a13b9dc16ff8c46f9676fa6d8e2ae701739b7e8a75aa1f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\28439349.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\28439349.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp866797.exe

    Filesize

    341KB

    MD5

    a403aaf46fd6ddaf0c9ae4b7111a64f7

    SHA1

    7ca0dfbbc0480354994fd150873e678c39e332fd

    SHA256

    d95f805162ceb938b588b2afa2246c7fd7963182b077f4a3d29f78e73822218f

    SHA512

    a335f9ccdbabb1ccabf8595f4b3c7c8727ff90bfb637a46d5c39e9daa70cb57f3d1d3bd577ed6d4208a8efd18e7323aa683d927b4894c70e94d46d88d899ba18

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp866797.exe

    Filesize

    341KB

    MD5

    a403aaf46fd6ddaf0c9ae4b7111a64f7

    SHA1

    7ca0dfbbc0480354994fd150873e678c39e332fd

    SHA256

    d95f805162ceb938b588b2afa2246c7fd7963182b077f4a3d29f78e73822218f

    SHA512

    a335f9ccdbabb1ccabf8595f4b3c7c8727ff90bfb637a46d5c39e9daa70cb57f3d1d3bd577ed6d4208a8efd18e7323aa683d927b4894c70e94d46d88d899ba18

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp866797.exe

    Filesize

    341KB

    MD5

    a403aaf46fd6ddaf0c9ae4b7111a64f7

    SHA1

    7ca0dfbbc0480354994fd150873e678c39e332fd

    SHA256

    d95f805162ceb938b588b2afa2246c7fd7963182b077f4a3d29f78e73822218f

    SHA512

    a335f9ccdbabb1ccabf8595f4b3c7c8727ff90bfb637a46d5c39e9daa70cb57f3d1d3bd577ed6d4208a8efd18e7323aa683d927b4894c70e94d46d88d899ba18

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st526346.exe

    Filesize

    497KB

    MD5

    0bf36d1dfb33416b731b2551fd3aa99f

    SHA1

    7236143b697cdafc0dd33bca3b37545e09e9ee73

    SHA256

    6e11d2b17a85a9a7fa88a801cd10252d3d3539245e6df45ae7d4ecf07a06d1d7

    SHA512

    0101b703f72fcd389a0196535b1420aaca3ac8c4e90a7bcaa2463931fcbe106547720e211c5a556227a13b9dc16ff8c46f9676fa6d8e2ae701739b7e8a75aa1f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st526346.exe

    Filesize

    497KB

    MD5

    0bf36d1dfb33416b731b2551fd3aa99f

    SHA1

    7236143b697cdafc0dd33bca3b37545e09e9ee73

    SHA256

    6e11d2b17a85a9a7fa88a801cd10252d3d3539245e6df45ae7d4ecf07a06d1d7

    SHA512

    0101b703f72fcd389a0196535b1420aaca3ac8c4e90a7bcaa2463931fcbe106547720e211c5a556227a13b9dc16ff8c46f9676fa6d8e2ae701739b7e8a75aa1f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\28439349.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\28439349.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp866797.exe

    Filesize

    341KB

    MD5

    a403aaf46fd6ddaf0c9ae4b7111a64f7

    SHA1

    7ca0dfbbc0480354994fd150873e678c39e332fd

    SHA256

    d95f805162ceb938b588b2afa2246c7fd7963182b077f4a3d29f78e73822218f

    SHA512

    a335f9ccdbabb1ccabf8595f4b3c7c8727ff90bfb637a46d5c39e9daa70cb57f3d1d3bd577ed6d4208a8efd18e7323aa683d927b4894c70e94d46d88d899ba18

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp866797.exe

    Filesize

    341KB

    MD5

    a403aaf46fd6ddaf0c9ae4b7111a64f7

    SHA1

    7ca0dfbbc0480354994fd150873e678c39e332fd

    SHA256

    d95f805162ceb938b588b2afa2246c7fd7963182b077f4a3d29f78e73822218f

    SHA512

    a335f9ccdbabb1ccabf8595f4b3c7c8727ff90bfb637a46d5c39e9daa70cb57f3d1d3bd577ed6d4208a8efd18e7323aa683d927b4894c70e94d46d88d899ba18

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp866797.exe

    Filesize

    341KB

    MD5

    a403aaf46fd6ddaf0c9ae4b7111a64f7

    SHA1

    7ca0dfbbc0480354994fd150873e678c39e332fd

    SHA256

    d95f805162ceb938b588b2afa2246c7fd7963182b077f4a3d29f78e73822218f

    SHA512

    a335f9ccdbabb1ccabf8595f4b3c7c8727ff90bfb637a46d5c39e9daa70cb57f3d1d3bd577ed6d4208a8efd18e7323aa683d927b4894c70e94d46d88d899ba18

  • memory/460-81-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-80-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-83-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-85-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-87-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-89-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-91-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-93-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-95-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-97-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-99-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-101-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-103-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-105-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-107-0x0000000000B20000-0x0000000000B33000-memory.dmp

    Filesize

    76KB

  • memory/460-79-0x0000000004BB0000-0x0000000004BF0000-memory.dmp

    Filesize

    256KB

  • memory/460-78-0x0000000004BB0000-0x0000000004BF0000-memory.dmp

    Filesize

    256KB

  • memory/460-77-0x0000000000B20000-0x0000000000B38000-memory.dmp

    Filesize

    96KB

  • memory/460-76-0x0000000004BB0000-0x0000000004BF0000-memory.dmp

    Filesize

    256KB

  • memory/460-75-0x0000000000310000-0x000000000032A000-memory.dmp

    Filesize

    104KB

  • memory/460-74-0x0000000004BB0000-0x0000000004BF0000-memory.dmp

    Filesize

    256KB

  • memory/920-120-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-141-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-118-0x0000000002470000-0x00000000024AC000-memory.dmp

    Filesize

    240KB

  • memory/920-121-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-123-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-125-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-129-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-127-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-131-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-133-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-135-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-137-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-139-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-119-0x00000000024B0000-0x00000000024EA000-memory.dmp

    Filesize

    232KB

  • memory/920-143-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-145-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-148-0x00000000008C0000-0x0000000000906000-memory.dmp

    Filesize

    280KB

  • memory/920-151-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-150-0x00000000049C0000-0x0000000004A00000-memory.dmp

    Filesize

    256KB

  • memory/920-147-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-153-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-155-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-157-0x00000000024B0000-0x00000000024E5000-memory.dmp

    Filesize

    212KB

  • memory/920-915-0x00000000049C0000-0x0000000004A00000-memory.dmp

    Filesize

    256KB

  • memory/920-916-0x00000000049C0000-0x0000000004A00000-memory.dmp

    Filesize

    256KB

  • memory/920-918-0x00000000049C0000-0x0000000004A00000-memory.dmp

    Filesize

    256KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.