Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 18:49

General

  • Target

    a5833a85260d6abcde0af4f7cb66fca352b98015308d54142ac0cf6b7fe52023.exe

  • Size

    690KB

  • MD5

    a040d30b578d01525062075d5033fa02

  • SHA1

    be10a96eb2c1aae00ad4a60863e5d79d4e5901b1

  • SHA256

    a5833a85260d6abcde0af4f7cb66fca352b98015308d54142ac0cf6b7fe52023

  • SHA512

    25c8c32ed207af29293727e89dc7335c9b2a59e6161d9632f62b779b03c46d5c6f498d25ba7d18723f0436e91ed61e244f1dbcba9ce0ec66bd7c9c93090ed763

  • SSDEEP

    12288:My90OTP01v71oAhaZkIJwTTVYT+urnGuqlb/cd2oB3vlCCiI22kEqke:MyvTP01v71ooaGkwTTV++urGuI7g26x2

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5833a85260d6abcde0af4f7cb66fca352b98015308d54142ac0cf6b7fe52023.exe
    "C:\Users\Admin\AppData\Local\Temp\a5833a85260d6abcde0af4f7cb66fca352b98015308d54142ac0cf6b7fe52023.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un069612.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un069612.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1980
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\18002885.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\18002885.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1496
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk728287.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk728287.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1044

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un069612.exe

    Filesize

    536KB

    MD5

    7da427c76aba24f15fba8d6b678c97d8

    SHA1

    73ba46b48b11bd84b5d1fb1f31573c7c64176fba

    SHA256

    7d792ec019942bad451253b0a28bb98545c93b3af477d31b8fb57f4e00f3a35a

    SHA512

    030bcaf5ee8ffe98ec9177f11350d137cfacc244c7c22b30e3fc7f4aeb3d6d63a4c2af25c25dbc8799f4cab1b0a431494cb955fbfb8b306fcb8dc42ae453f49e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un069612.exe

    Filesize

    536KB

    MD5

    7da427c76aba24f15fba8d6b678c97d8

    SHA1

    73ba46b48b11bd84b5d1fb1f31573c7c64176fba

    SHA256

    7d792ec019942bad451253b0a28bb98545c93b3af477d31b8fb57f4e00f3a35a

    SHA512

    030bcaf5ee8ffe98ec9177f11350d137cfacc244c7c22b30e3fc7f4aeb3d6d63a4c2af25c25dbc8799f4cab1b0a431494cb955fbfb8b306fcb8dc42ae453f49e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\18002885.exe

    Filesize

    259KB

    MD5

    f246ab38c4583449f787d6ba90191b11

    SHA1

    b27773ee66a97fe95d03fd6b14a46b2d975cfd9b

    SHA256

    20dce831c494e08fea6a5cba58d40f35baf8a40252d9083c4e23db6f07ac0700

    SHA512

    dfe199d4b367daeddad330d7cd6c06982f4fd66600d5262751647d41816bbb747caa884b8d5f862f32604f70a311b38d2394a6dac29f90dc88d0ebe6e58bfe5f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\18002885.exe

    Filesize

    259KB

    MD5

    f246ab38c4583449f787d6ba90191b11

    SHA1

    b27773ee66a97fe95d03fd6b14a46b2d975cfd9b

    SHA256

    20dce831c494e08fea6a5cba58d40f35baf8a40252d9083c4e23db6f07ac0700

    SHA512

    dfe199d4b367daeddad330d7cd6c06982f4fd66600d5262751647d41816bbb747caa884b8d5f862f32604f70a311b38d2394a6dac29f90dc88d0ebe6e58bfe5f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\18002885.exe

    Filesize

    259KB

    MD5

    f246ab38c4583449f787d6ba90191b11

    SHA1

    b27773ee66a97fe95d03fd6b14a46b2d975cfd9b

    SHA256

    20dce831c494e08fea6a5cba58d40f35baf8a40252d9083c4e23db6f07ac0700

    SHA512

    dfe199d4b367daeddad330d7cd6c06982f4fd66600d5262751647d41816bbb747caa884b8d5f862f32604f70a311b38d2394a6dac29f90dc88d0ebe6e58bfe5f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk728287.exe

    Filesize

    341KB

    MD5

    206c71b72ab08b69c3aa2847f03903aa

    SHA1

    1b14f68b225e76bf6ce52f58defdf78ff4433e46

    SHA256

    f0cfd87fcb07e71927cdd2f3886019a5bc5accc251d93c6a1628f03d089d33aa

    SHA512

    c4bbcf02d87183d8b1566299aef88bb93849db5c8928373c15ab253081f6fcfa0858475ff4c1ff429af94156c53d788c93eb6ff551c539689d5a4e5c5620f5f5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk728287.exe

    Filesize

    341KB

    MD5

    206c71b72ab08b69c3aa2847f03903aa

    SHA1

    1b14f68b225e76bf6ce52f58defdf78ff4433e46

    SHA256

    f0cfd87fcb07e71927cdd2f3886019a5bc5accc251d93c6a1628f03d089d33aa

    SHA512

    c4bbcf02d87183d8b1566299aef88bb93849db5c8928373c15ab253081f6fcfa0858475ff4c1ff429af94156c53d788c93eb6ff551c539689d5a4e5c5620f5f5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk728287.exe

    Filesize

    341KB

    MD5

    206c71b72ab08b69c3aa2847f03903aa

    SHA1

    1b14f68b225e76bf6ce52f58defdf78ff4433e46

    SHA256

    f0cfd87fcb07e71927cdd2f3886019a5bc5accc251d93c6a1628f03d089d33aa

    SHA512

    c4bbcf02d87183d8b1566299aef88bb93849db5c8928373c15ab253081f6fcfa0858475ff4c1ff429af94156c53d788c93eb6ff551c539689d5a4e5c5620f5f5

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un069612.exe

    Filesize

    536KB

    MD5

    7da427c76aba24f15fba8d6b678c97d8

    SHA1

    73ba46b48b11bd84b5d1fb1f31573c7c64176fba

    SHA256

    7d792ec019942bad451253b0a28bb98545c93b3af477d31b8fb57f4e00f3a35a

    SHA512

    030bcaf5ee8ffe98ec9177f11350d137cfacc244c7c22b30e3fc7f4aeb3d6d63a4c2af25c25dbc8799f4cab1b0a431494cb955fbfb8b306fcb8dc42ae453f49e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un069612.exe

    Filesize

    536KB

    MD5

    7da427c76aba24f15fba8d6b678c97d8

    SHA1

    73ba46b48b11bd84b5d1fb1f31573c7c64176fba

    SHA256

    7d792ec019942bad451253b0a28bb98545c93b3af477d31b8fb57f4e00f3a35a

    SHA512

    030bcaf5ee8ffe98ec9177f11350d137cfacc244c7c22b30e3fc7f4aeb3d6d63a4c2af25c25dbc8799f4cab1b0a431494cb955fbfb8b306fcb8dc42ae453f49e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\18002885.exe

    Filesize

    259KB

    MD5

    f246ab38c4583449f787d6ba90191b11

    SHA1

    b27773ee66a97fe95d03fd6b14a46b2d975cfd9b

    SHA256

    20dce831c494e08fea6a5cba58d40f35baf8a40252d9083c4e23db6f07ac0700

    SHA512

    dfe199d4b367daeddad330d7cd6c06982f4fd66600d5262751647d41816bbb747caa884b8d5f862f32604f70a311b38d2394a6dac29f90dc88d0ebe6e58bfe5f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\18002885.exe

    Filesize

    259KB

    MD5

    f246ab38c4583449f787d6ba90191b11

    SHA1

    b27773ee66a97fe95d03fd6b14a46b2d975cfd9b

    SHA256

    20dce831c494e08fea6a5cba58d40f35baf8a40252d9083c4e23db6f07ac0700

    SHA512

    dfe199d4b367daeddad330d7cd6c06982f4fd66600d5262751647d41816bbb747caa884b8d5f862f32604f70a311b38d2394a6dac29f90dc88d0ebe6e58bfe5f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\18002885.exe

    Filesize

    259KB

    MD5

    f246ab38c4583449f787d6ba90191b11

    SHA1

    b27773ee66a97fe95d03fd6b14a46b2d975cfd9b

    SHA256

    20dce831c494e08fea6a5cba58d40f35baf8a40252d9083c4e23db6f07ac0700

    SHA512

    dfe199d4b367daeddad330d7cd6c06982f4fd66600d5262751647d41816bbb747caa884b8d5f862f32604f70a311b38d2394a6dac29f90dc88d0ebe6e58bfe5f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk728287.exe

    Filesize

    341KB

    MD5

    206c71b72ab08b69c3aa2847f03903aa

    SHA1

    1b14f68b225e76bf6ce52f58defdf78ff4433e46

    SHA256

    f0cfd87fcb07e71927cdd2f3886019a5bc5accc251d93c6a1628f03d089d33aa

    SHA512

    c4bbcf02d87183d8b1566299aef88bb93849db5c8928373c15ab253081f6fcfa0858475ff4c1ff429af94156c53d788c93eb6ff551c539689d5a4e5c5620f5f5

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk728287.exe

    Filesize

    341KB

    MD5

    206c71b72ab08b69c3aa2847f03903aa

    SHA1

    1b14f68b225e76bf6ce52f58defdf78ff4433e46

    SHA256

    f0cfd87fcb07e71927cdd2f3886019a5bc5accc251d93c6a1628f03d089d33aa

    SHA512

    c4bbcf02d87183d8b1566299aef88bb93849db5c8928373c15ab253081f6fcfa0858475ff4c1ff429af94156c53d788c93eb6ff551c539689d5a4e5c5620f5f5

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk728287.exe

    Filesize

    341KB

    MD5

    206c71b72ab08b69c3aa2847f03903aa

    SHA1

    1b14f68b225e76bf6ce52f58defdf78ff4433e46

    SHA256

    f0cfd87fcb07e71927cdd2f3886019a5bc5accc251d93c6a1628f03d089d33aa

    SHA512

    c4bbcf02d87183d8b1566299aef88bb93849db5c8928373c15ab253081f6fcfa0858475ff4c1ff429af94156c53d788c93eb6ff551c539689d5a4e5c5620f5f5

  • memory/1044-141-0x0000000002190000-0x00000000021C5000-memory.dmp

    Filesize

    212KB

  • memory/1044-147-0x0000000002190000-0x00000000021C5000-memory.dmp

    Filesize

    212KB

  • memory/1044-927-0x0000000004BC0000-0x0000000004C00000-memory.dmp

    Filesize

    256KB

  • memory/1044-925-0x0000000004BC0000-0x0000000004C00000-memory.dmp

    Filesize

    256KB

  • memory/1044-924-0x0000000004BC0000-0x0000000004C00000-memory.dmp

    Filesize

    256KB

  • memory/1044-922-0x0000000004BC0000-0x0000000004C00000-memory.dmp

    Filesize

    256KB

  • memory/1044-330-0x0000000004BC0000-0x0000000004C00000-memory.dmp

    Filesize

    256KB

  • memory/1044-328-0x0000000004BC0000-0x0000000004C00000-memory.dmp

    Filesize

    256KB

  • memory/1044-326-0x0000000004BC0000-0x0000000004C00000-memory.dmp

    Filesize

    256KB

  • memory/1044-324-0x0000000000280000-0x00000000002C6000-memory.dmp

    Filesize

    280KB

  • memory/1044-157-0x0000000002190000-0x00000000021C5000-memory.dmp

    Filesize

    212KB

  • memory/1044-155-0x0000000002190000-0x00000000021C5000-memory.dmp

    Filesize

    212KB

  • memory/1044-153-0x0000000002190000-0x00000000021C5000-memory.dmp

    Filesize

    212KB

  • memory/1044-149-0x0000000002190000-0x00000000021C5000-memory.dmp

    Filesize

    212KB

  • memory/1044-151-0x0000000002190000-0x00000000021C5000-memory.dmp

    Filesize

    212KB

  • memory/1044-145-0x0000000002190000-0x00000000021C5000-memory.dmp

    Filesize

    212KB

  • memory/1044-143-0x0000000002190000-0x00000000021C5000-memory.dmp

    Filesize

    212KB

  • memory/1044-139-0x0000000002190000-0x00000000021C5000-memory.dmp

    Filesize

    212KB

  • memory/1044-137-0x0000000002190000-0x00000000021C5000-memory.dmp

    Filesize

    212KB

  • memory/1044-135-0x0000000002190000-0x00000000021C5000-memory.dmp

    Filesize

    212KB

  • memory/1044-133-0x0000000002190000-0x00000000021C5000-memory.dmp

    Filesize

    212KB

  • memory/1044-131-0x0000000002190000-0x00000000021C5000-memory.dmp

    Filesize

    212KB

  • memory/1044-124-0x0000000001FE0000-0x000000000201C000-memory.dmp

    Filesize

    240KB

  • memory/1044-125-0x0000000002190000-0x00000000021CA000-memory.dmp

    Filesize

    232KB

  • memory/1044-126-0x0000000002190000-0x00000000021C5000-memory.dmp

    Filesize

    212KB

  • memory/1044-129-0x0000000002190000-0x00000000021C5000-memory.dmp

    Filesize

    212KB

  • memory/1044-127-0x0000000002190000-0x00000000021C5000-memory.dmp

    Filesize

    212KB

  • memory/1496-89-0x0000000000A90000-0x0000000000AA3000-memory.dmp

    Filesize

    76KB

  • memory/1496-109-0x0000000004CA0000-0x0000000004CE0000-memory.dmp

    Filesize

    256KB

  • memory/1496-81-0x0000000000A90000-0x0000000000AA3000-memory.dmp

    Filesize

    76KB

  • memory/1496-83-0x0000000000A90000-0x0000000000AA3000-memory.dmp

    Filesize

    76KB

  • memory/1496-85-0x0000000000A90000-0x0000000000AA3000-memory.dmp

    Filesize

    76KB

  • memory/1496-78-0x00000000005C0000-0x00000000005DA000-memory.dmp

    Filesize

    104KB

  • memory/1496-87-0x0000000000A90000-0x0000000000AA3000-memory.dmp

    Filesize

    76KB

  • memory/1496-113-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1496-111-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/1496-108-0x0000000000240000-0x000000000026D000-memory.dmp

    Filesize

    180KB

  • memory/1496-80-0x0000000000A90000-0x0000000000AA3000-memory.dmp

    Filesize

    76KB

  • memory/1496-79-0x0000000000A90000-0x0000000000AA8000-memory.dmp

    Filesize

    96KB

  • memory/1496-110-0x0000000004CA0000-0x0000000004CE0000-memory.dmp

    Filesize

    256KB

  • memory/1496-107-0x0000000000A90000-0x0000000000AA3000-memory.dmp

    Filesize

    76KB

  • memory/1496-105-0x0000000000A90000-0x0000000000AA3000-memory.dmp

    Filesize

    76KB

  • memory/1496-101-0x0000000000A90000-0x0000000000AA3000-memory.dmp

    Filesize

    76KB

  • memory/1496-103-0x0000000000A90000-0x0000000000AA3000-memory.dmp

    Filesize

    76KB

  • memory/1496-99-0x0000000000A90000-0x0000000000AA3000-memory.dmp

    Filesize

    76KB

  • memory/1496-97-0x0000000000A90000-0x0000000000AA3000-memory.dmp

    Filesize

    76KB

  • memory/1496-95-0x0000000000A90000-0x0000000000AA3000-memory.dmp

    Filesize

    76KB

  • memory/1496-93-0x0000000000A90000-0x0000000000AA3000-memory.dmp

    Filesize

    76KB

  • memory/1496-91-0x0000000000A90000-0x0000000000AA3000-memory.dmp

    Filesize

    76KB