Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
178s -
max time network
185s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 19:17
Static task
static1
Behavioral task
behavioral1
Sample
bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe
Resource
win10v2004-20230221-en
General
-
Target
bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe
-
Size
563KB
-
MD5
870aa86a43dbb23e56f31ff9f91bbba1
-
SHA1
5b2e84d06466d77bc2447600996dbb4a8440d4cb
-
SHA256
bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f
-
SHA512
cc6d2f062f4ee89e45ccab3058e80da34a3eca5aa9a5a47e369ed4caab570c8d1b61296a6fa971147ec64815f8cf92167d4bcd43b450841ccd656ff106ab713d
-
SSDEEP
12288:3y90jDej8qyV36VdOIIM7Vgmb6w0xcTolCIt7QV+CImv66q:3yhIqyVKa/wumgxcslvVHX
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 11515346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 11515346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 11515346.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 11515346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 11515346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 11515346.exe -
Executes dropped EXE 3 IoCs
pid Process 1648 st932756.exe 696 11515346.exe 1172 kp744385.exe -
Loads dropped DLL 6 IoCs
pid Process 924 bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe 1648 st932756.exe 1648 st932756.exe 1648 st932756.exe 1648 st932756.exe 1172 kp744385.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features 11515346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 11515346.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce st932756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st932756.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 696 11515346.exe 696 11515346.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 696 11515346.exe Token: SeDebugPrivilege 1172 kp744385.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 924 wrote to memory of 1648 924 bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe 28 PID 924 wrote to memory of 1648 924 bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe 28 PID 924 wrote to memory of 1648 924 bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe 28 PID 924 wrote to memory of 1648 924 bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe 28 PID 924 wrote to memory of 1648 924 bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe 28 PID 924 wrote to memory of 1648 924 bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe 28 PID 924 wrote to memory of 1648 924 bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe 28 PID 1648 wrote to memory of 696 1648 st932756.exe 29 PID 1648 wrote to memory of 696 1648 st932756.exe 29 PID 1648 wrote to memory of 696 1648 st932756.exe 29 PID 1648 wrote to memory of 696 1648 st932756.exe 29 PID 1648 wrote to memory of 696 1648 st932756.exe 29 PID 1648 wrote to memory of 696 1648 st932756.exe 29 PID 1648 wrote to memory of 696 1648 st932756.exe 29 PID 1648 wrote to memory of 1172 1648 st932756.exe 30 PID 1648 wrote to memory of 1172 1648 st932756.exe 30 PID 1648 wrote to memory of 1172 1648 st932756.exe 30 PID 1648 wrote to memory of 1172 1648 st932756.exe 30 PID 1648 wrote to memory of 1172 1648 st932756.exe 30 PID 1648 wrote to memory of 1172 1648 st932756.exe 30 PID 1648 wrote to memory of 1172 1648 st932756.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe"C:\Users\Admin\AppData\Local\Temp\bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st932756.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st932756.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11515346.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11515346.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:696
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744385.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744385.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD57152e78bfa0906109303630d8a5ada60
SHA1c8bebfce660473bb5668105d138b442c066f91b9
SHA2565f8e27b265bea96f1f364bae8d9217a57694e5394fdb704e91b4ffcf1a017471
SHA51273eba88880ac839e10ddb3baa213b9a135ecd2e06af1d94d2c54db08109cb2a32ccdea00763ccac3b97cdcba5084983fa7a694ac2c3d1e591945cf3322d1e711
-
Filesize
408KB
MD57152e78bfa0906109303630d8a5ada60
SHA1c8bebfce660473bb5668105d138b442c066f91b9
SHA2565f8e27b265bea96f1f364bae8d9217a57694e5394fdb704e91b4ffcf1a017471
SHA51273eba88880ac839e10ddb3baa213b9a135ecd2e06af1d94d2c54db08109cb2a32ccdea00763ccac3b97cdcba5084983fa7a694ac2c3d1e591945cf3322d1e711
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
360KB
MD567a0a981e72175a44d5435a6c2eaac73
SHA1dcd9adfcd6cbca66f53988577dcbd141ac456043
SHA256020a53857bb0f3cf77539f5ecfc8dd820ba3642e92271c1900e724c9056a5040
SHA512e42bd9e68330ca0d32d91bd13bf24b37317ddedc97b0d6a291fb1a4da3079049b3afc70b4107423f494cb0801c5084604cf782e941ffb1f0338e275ed42a2cfc
-
Filesize
360KB
MD567a0a981e72175a44d5435a6c2eaac73
SHA1dcd9adfcd6cbca66f53988577dcbd141ac456043
SHA256020a53857bb0f3cf77539f5ecfc8dd820ba3642e92271c1900e724c9056a5040
SHA512e42bd9e68330ca0d32d91bd13bf24b37317ddedc97b0d6a291fb1a4da3079049b3afc70b4107423f494cb0801c5084604cf782e941ffb1f0338e275ed42a2cfc
-
Filesize
360KB
MD567a0a981e72175a44d5435a6c2eaac73
SHA1dcd9adfcd6cbca66f53988577dcbd141ac456043
SHA256020a53857bb0f3cf77539f5ecfc8dd820ba3642e92271c1900e724c9056a5040
SHA512e42bd9e68330ca0d32d91bd13bf24b37317ddedc97b0d6a291fb1a4da3079049b3afc70b4107423f494cb0801c5084604cf782e941ffb1f0338e275ed42a2cfc
-
Filesize
408KB
MD57152e78bfa0906109303630d8a5ada60
SHA1c8bebfce660473bb5668105d138b442c066f91b9
SHA2565f8e27b265bea96f1f364bae8d9217a57694e5394fdb704e91b4ffcf1a017471
SHA51273eba88880ac839e10ddb3baa213b9a135ecd2e06af1d94d2c54db08109cb2a32ccdea00763ccac3b97cdcba5084983fa7a694ac2c3d1e591945cf3322d1e711
-
Filesize
408KB
MD57152e78bfa0906109303630d8a5ada60
SHA1c8bebfce660473bb5668105d138b442c066f91b9
SHA2565f8e27b265bea96f1f364bae8d9217a57694e5394fdb704e91b4ffcf1a017471
SHA51273eba88880ac839e10ddb3baa213b9a135ecd2e06af1d94d2c54db08109cb2a32ccdea00763ccac3b97cdcba5084983fa7a694ac2c3d1e591945cf3322d1e711
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
360KB
MD567a0a981e72175a44d5435a6c2eaac73
SHA1dcd9adfcd6cbca66f53988577dcbd141ac456043
SHA256020a53857bb0f3cf77539f5ecfc8dd820ba3642e92271c1900e724c9056a5040
SHA512e42bd9e68330ca0d32d91bd13bf24b37317ddedc97b0d6a291fb1a4da3079049b3afc70b4107423f494cb0801c5084604cf782e941ffb1f0338e275ed42a2cfc
-
Filesize
360KB
MD567a0a981e72175a44d5435a6c2eaac73
SHA1dcd9adfcd6cbca66f53988577dcbd141ac456043
SHA256020a53857bb0f3cf77539f5ecfc8dd820ba3642e92271c1900e724c9056a5040
SHA512e42bd9e68330ca0d32d91bd13bf24b37317ddedc97b0d6a291fb1a4da3079049b3afc70b4107423f494cb0801c5084604cf782e941ffb1f0338e275ed42a2cfc
-
Filesize
360KB
MD567a0a981e72175a44d5435a6c2eaac73
SHA1dcd9adfcd6cbca66f53988577dcbd141ac456043
SHA256020a53857bb0f3cf77539f5ecfc8dd820ba3642e92271c1900e724c9056a5040
SHA512e42bd9e68330ca0d32d91bd13bf24b37317ddedc97b0d6a291fb1a4da3079049b3afc70b4107423f494cb0801c5084604cf782e941ffb1f0338e275ed42a2cfc