Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 19:03

General

  • Target

    b0ef5bafdc181862d4819522ee512b7d5ece0a224be6653cc07301ebd2d3c8f5.exe

  • Size

    690KB

  • MD5

    e9cecfead46812d6bb2ece041f1b5f5c

  • SHA1

    603423ddeb419635af05b0424c50acc60e2872b6

  • SHA256

    b0ef5bafdc181862d4819522ee512b7d5ece0a224be6653cc07301ebd2d3c8f5

  • SHA512

    97a2675335f13614a213c7578cc89b6227354bbaf17bf766cd5cf9a393cbc31307564176cb20b7b2de23bef5fc722d993669530291d0facbb34b5f9784f26fca

  • SSDEEP

    12288:ey90lGXw96zRbbWKz5bo79ZDgUuPd/e5SSNIc/JxDkkdWqpBTcEb+s:eyWGXTRt0Xsmf7xDkkcqp+bs

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0ef5bafdc181862d4819522ee512b7d5ece0a224be6653cc07301ebd2d3c8f5.exe
    "C:\Users\Admin\AppData\Local\Temp\b0ef5bafdc181862d4819522ee512b7d5ece0a224be6653cc07301ebd2d3c8f5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un168236.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un168236.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\25394030.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\25394030.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:988
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk812873.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk812873.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:976

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un168236.exe

    Filesize

    536KB

    MD5

    d952305ede611c7b7522b370bbf62385

    SHA1

    0b6d86e44ebe82da2940ca080b4c9fac7ce46dc4

    SHA256

    351a08b220f5fb3a4e74d6fe8a5d21910f5d7a339723d92fe0e258c3ea1c09f6

    SHA512

    0e2bcb17cef7fa7009bc95d6b56581eaafe45c74b5ace930a2ad298f3a863ef6f0dcc03402eb975e02daf82f874b10ae0d0e0a48f6255d69d18046102d620568

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un168236.exe

    Filesize

    536KB

    MD5

    d952305ede611c7b7522b370bbf62385

    SHA1

    0b6d86e44ebe82da2940ca080b4c9fac7ce46dc4

    SHA256

    351a08b220f5fb3a4e74d6fe8a5d21910f5d7a339723d92fe0e258c3ea1c09f6

    SHA512

    0e2bcb17cef7fa7009bc95d6b56581eaafe45c74b5ace930a2ad298f3a863ef6f0dcc03402eb975e02daf82f874b10ae0d0e0a48f6255d69d18046102d620568

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\25394030.exe

    Filesize

    259KB

    MD5

    717503a4a1a8cff617480edc2584b656

    SHA1

    1f06f3c2220a06da4adcf3b803235eb6402f00c6

    SHA256

    f7ac453ed8863bd0c1ccbd3211178bedf2d96f6684eb0e7944b33e812b35a9c6

    SHA512

    4647e7740a181a282256b8d4cd6eca28ee3494738adbabf3bad514759f1d48c89b362b93f16b1115c0dd57fa09f141c01eec58aa84c809e7256a37f2466931ed

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\25394030.exe

    Filesize

    259KB

    MD5

    717503a4a1a8cff617480edc2584b656

    SHA1

    1f06f3c2220a06da4adcf3b803235eb6402f00c6

    SHA256

    f7ac453ed8863bd0c1ccbd3211178bedf2d96f6684eb0e7944b33e812b35a9c6

    SHA512

    4647e7740a181a282256b8d4cd6eca28ee3494738adbabf3bad514759f1d48c89b362b93f16b1115c0dd57fa09f141c01eec58aa84c809e7256a37f2466931ed

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\25394030.exe

    Filesize

    259KB

    MD5

    717503a4a1a8cff617480edc2584b656

    SHA1

    1f06f3c2220a06da4adcf3b803235eb6402f00c6

    SHA256

    f7ac453ed8863bd0c1ccbd3211178bedf2d96f6684eb0e7944b33e812b35a9c6

    SHA512

    4647e7740a181a282256b8d4cd6eca28ee3494738adbabf3bad514759f1d48c89b362b93f16b1115c0dd57fa09f141c01eec58aa84c809e7256a37f2466931ed

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk812873.exe

    Filesize

    342KB

    MD5

    07592f4f06ec5251932914963ddb9c5b

    SHA1

    bb87c618ef9495a1c8ea60a7cfeee1af79b907ef

    SHA256

    e98bb68f40f15f2f122c305ea419fd9a1d87e952826af6f28dec013d467ab2bf

    SHA512

    2225ddb51380fe3c9b0649d8c17d25742d4f799be623782590ab5452e48560d1933f0576feec9f7aba60c3da3ac38483ee1b7422e2b1f434f6753448c9b4b4c2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk812873.exe

    Filesize

    342KB

    MD5

    07592f4f06ec5251932914963ddb9c5b

    SHA1

    bb87c618ef9495a1c8ea60a7cfeee1af79b907ef

    SHA256

    e98bb68f40f15f2f122c305ea419fd9a1d87e952826af6f28dec013d467ab2bf

    SHA512

    2225ddb51380fe3c9b0649d8c17d25742d4f799be623782590ab5452e48560d1933f0576feec9f7aba60c3da3ac38483ee1b7422e2b1f434f6753448c9b4b4c2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk812873.exe

    Filesize

    342KB

    MD5

    07592f4f06ec5251932914963ddb9c5b

    SHA1

    bb87c618ef9495a1c8ea60a7cfeee1af79b907ef

    SHA256

    e98bb68f40f15f2f122c305ea419fd9a1d87e952826af6f28dec013d467ab2bf

    SHA512

    2225ddb51380fe3c9b0649d8c17d25742d4f799be623782590ab5452e48560d1933f0576feec9f7aba60c3da3ac38483ee1b7422e2b1f434f6753448c9b4b4c2

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un168236.exe

    Filesize

    536KB

    MD5

    d952305ede611c7b7522b370bbf62385

    SHA1

    0b6d86e44ebe82da2940ca080b4c9fac7ce46dc4

    SHA256

    351a08b220f5fb3a4e74d6fe8a5d21910f5d7a339723d92fe0e258c3ea1c09f6

    SHA512

    0e2bcb17cef7fa7009bc95d6b56581eaafe45c74b5ace930a2ad298f3a863ef6f0dcc03402eb975e02daf82f874b10ae0d0e0a48f6255d69d18046102d620568

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un168236.exe

    Filesize

    536KB

    MD5

    d952305ede611c7b7522b370bbf62385

    SHA1

    0b6d86e44ebe82da2940ca080b4c9fac7ce46dc4

    SHA256

    351a08b220f5fb3a4e74d6fe8a5d21910f5d7a339723d92fe0e258c3ea1c09f6

    SHA512

    0e2bcb17cef7fa7009bc95d6b56581eaafe45c74b5ace930a2ad298f3a863ef6f0dcc03402eb975e02daf82f874b10ae0d0e0a48f6255d69d18046102d620568

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\25394030.exe

    Filesize

    259KB

    MD5

    717503a4a1a8cff617480edc2584b656

    SHA1

    1f06f3c2220a06da4adcf3b803235eb6402f00c6

    SHA256

    f7ac453ed8863bd0c1ccbd3211178bedf2d96f6684eb0e7944b33e812b35a9c6

    SHA512

    4647e7740a181a282256b8d4cd6eca28ee3494738adbabf3bad514759f1d48c89b362b93f16b1115c0dd57fa09f141c01eec58aa84c809e7256a37f2466931ed

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\25394030.exe

    Filesize

    259KB

    MD5

    717503a4a1a8cff617480edc2584b656

    SHA1

    1f06f3c2220a06da4adcf3b803235eb6402f00c6

    SHA256

    f7ac453ed8863bd0c1ccbd3211178bedf2d96f6684eb0e7944b33e812b35a9c6

    SHA512

    4647e7740a181a282256b8d4cd6eca28ee3494738adbabf3bad514759f1d48c89b362b93f16b1115c0dd57fa09f141c01eec58aa84c809e7256a37f2466931ed

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\25394030.exe

    Filesize

    259KB

    MD5

    717503a4a1a8cff617480edc2584b656

    SHA1

    1f06f3c2220a06da4adcf3b803235eb6402f00c6

    SHA256

    f7ac453ed8863bd0c1ccbd3211178bedf2d96f6684eb0e7944b33e812b35a9c6

    SHA512

    4647e7740a181a282256b8d4cd6eca28ee3494738adbabf3bad514759f1d48c89b362b93f16b1115c0dd57fa09f141c01eec58aa84c809e7256a37f2466931ed

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk812873.exe

    Filesize

    342KB

    MD5

    07592f4f06ec5251932914963ddb9c5b

    SHA1

    bb87c618ef9495a1c8ea60a7cfeee1af79b907ef

    SHA256

    e98bb68f40f15f2f122c305ea419fd9a1d87e952826af6f28dec013d467ab2bf

    SHA512

    2225ddb51380fe3c9b0649d8c17d25742d4f799be623782590ab5452e48560d1933f0576feec9f7aba60c3da3ac38483ee1b7422e2b1f434f6753448c9b4b4c2

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk812873.exe

    Filesize

    342KB

    MD5

    07592f4f06ec5251932914963ddb9c5b

    SHA1

    bb87c618ef9495a1c8ea60a7cfeee1af79b907ef

    SHA256

    e98bb68f40f15f2f122c305ea419fd9a1d87e952826af6f28dec013d467ab2bf

    SHA512

    2225ddb51380fe3c9b0649d8c17d25742d4f799be623782590ab5452e48560d1933f0576feec9f7aba60c3da3ac38483ee1b7422e2b1f434f6753448c9b4b4c2

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk812873.exe

    Filesize

    342KB

    MD5

    07592f4f06ec5251932914963ddb9c5b

    SHA1

    bb87c618ef9495a1c8ea60a7cfeee1af79b907ef

    SHA256

    e98bb68f40f15f2f122c305ea419fd9a1d87e952826af6f28dec013d467ab2bf

    SHA512

    2225ddb51380fe3c9b0649d8c17d25742d4f799be623782590ab5452e48560d1933f0576feec9f7aba60c3da3ac38483ee1b7422e2b1f434f6753448c9b4b4c2

  • memory/976-140-0x00000000020C0000-0x00000000020F5000-memory.dmp

    Filesize

    212KB

  • memory/976-150-0x00000000020C0000-0x00000000020F5000-memory.dmp

    Filesize

    212KB

  • memory/976-924-0x0000000004C30000-0x0000000004C70000-memory.dmp

    Filesize

    256KB

  • memory/976-923-0x0000000004C30000-0x0000000004C70000-memory.dmp

    Filesize

    256KB

  • memory/976-921-0x0000000004C30000-0x0000000004C70000-memory.dmp

    Filesize

    256KB

  • memory/976-529-0x0000000004C30000-0x0000000004C70000-memory.dmp

    Filesize

    256KB

  • memory/976-527-0x0000000004C30000-0x0000000004C70000-memory.dmp

    Filesize

    256KB

  • memory/976-525-0x0000000004C30000-0x0000000004C70000-memory.dmp

    Filesize

    256KB

  • memory/976-523-0x00000000002C0000-0x0000000000306000-memory.dmp

    Filesize

    280KB

  • memory/976-158-0x00000000020C0000-0x00000000020F5000-memory.dmp

    Filesize

    212KB

  • memory/976-156-0x00000000020C0000-0x00000000020F5000-memory.dmp

    Filesize

    212KB

  • memory/976-154-0x00000000020C0000-0x00000000020F5000-memory.dmp

    Filesize

    212KB

  • memory/976-152-0x00000000020C0000-0x00000000020F5000-memory.dmp

    Filesize

    212KB

  • memory/976-148-0x00000000020C0000-0x00000000020F5000-memory.dmp

    Filesize

    212KB

  • memory/976-146-0x00000000020C0000-0x00000000020F5000-memory.dmp

    Filesize

    212KB

  • memory/976-144-0x00000000020C0000-0x00000000020F5000-memory.dmp

    Filesize

    212KB

  • memory/976-142-0x00000000020C0000-0x00000000020F5000-memory.dmp

    Filesize

    212KB

  • memory/976-138-0x00000000020C0000-0x00000000020F5000-memory.dmp

    Filesize

    212KB

  • memory/976-136-0x00000000020C0000-0x00000000020F5000-memory.dmp

    Filesize

    212KB

  • memory/976-134-0x00000000020C0000-0x00000000020F5000-memory.dmp

    Filesize

    212KB

  • memory/976-132-0x00000000020C0000-0x00000000020F5000-memory.dmp

    Filesize

    212KB

  • memory/976-130-0x00000000020C0000-0x00000000020F5000-memory.dmp

    Filesize

    212KB

  • memory/976-123-0x0000000000B90000-0x0000000000BCC000-memory.dmp

    Filesize

    240KB

  • memory/976-124-0x00000000020C0000-0x00000000020FA000-memory.dmp

    Filesize

    232KB

  • memory/976-125-0x00000000020C0000-0x00000000020F5000-memory.dmp

    Filesize

    212KB

  • memory/976-126-0x00000000020C0000-0x00000000020F5000-memory.dmp

    Filesize

    212KB

  • memory/976-128-0x00000000020C0000-0x00000000020F5000-memory.dmp

    Filesize

    212KB

  • memory/988-88-0x0000000000D30000-0x0000000000D43000-memory.dmp

    Filesize

    76KB

  • memory/988-109-0x0000000004B20000-0x0000000004B60000-memory.dmp

    Filesize

    256KB

  • memory/988-81-0x0000000000D30000-0x0000000000D43000-memory.dmp

    Filesize

    76KB

  • memory/988-82-0x0000000000D30000-0x0000000000D43000-memory.dmp

    Filesize

    76KB

  • memory/988-84-0x0000000000D30000-0x0000000000D43000-memory.dmp

    Filesize

    76KB

  • memory/988-78-0x0000000000240000-0x000000000026D000-memory.dmp

    Filesize

    180KB

  • memory/988-86-0x0000000000D30000-0x0000000000D43000-memory.dmp

    Filesize

    76KB

  • memory/988-112-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/988-111-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/988-106-0x0000000000D30000-0x0000000000D43000-memory.dmp

    Filesize

    76KB

  • memory/988-80-0x0000000000D30000-0x0000000000D48000-memory.dmp

    Filesize

    96KB

  • memory/988-79-0x0000000000B00000-0x0000000000B1A000-memory.dmp

    Filesize

    104KB

  • memory/988-110-0x0000000004B20000-0x0000000004B60000-memory.dmp

    Filesize

    256KB

  • memory/988-108-0x0000000000D30000-0x0000000000D43000-memory.dmp

    Filesize

    76KB

  • memory/988-102-0x0000000000D30000-0x0000000000D43000-memory.dmp

    Filesize

    76KB

  • memory/988-104-0x0000000000D30000-0x0000000000D43000-memory.dmp

    Filesize

    76KB

  • memory/988-94-0x0000000000D30000-0x0000000000D43000-memory.dmp

    Filesize

    76KB

  • memory/988-98-0x0000000000D30000-0x0000000000D43000-memory.dmp

    Filesize

    76KB

  • memory/988-100-0x0000000000D30000-0x0000000000D43000-memory.dmp

    Filesize

    76KB

  • memory/988-96-0x0000000000D30000-0x0000000000D43000-memory.dmp

    Filesize

    76KB

  • memory/988-90-0x0000000000D30000-0x0000000000D43000-memory.dmp

    Filesize

    76KB

  • memory/988-92-0x0000000000D30000-0x0000000000D43000-memory.dmp

    Filesize

    76KB