Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    178s
  • max time network
    185s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 19:17

General

  • Target

    bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe

  • Size

    563KB

  • MD5

    870aa86a43dbb23e56f31ff9f91bbba1

  • SHA1

    5b2e84d06466d77bc2447600996dbb4a8440d4cb

  • SHA256

    bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f

  • SHA512

    cc6d2f062f4ee89e45ccab3058e80da34a3eca5aa9a5a47e369ed4caab570c8d1b61296a6fa971147ec64815f8cf92167d4bcd43b450841ccd656ff106ab713d

  • SSDEEP

    12288:3y90jDej8qyV36VdOIIM7Vgmb6w0xcTolCIt7QV+CImv66q:3yhIqyVKa/wumgxcslvVHX

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe
    "C:\Users\Admin\AppData\Local\Temp\bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:924
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st932756.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st932756.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1648
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11515346.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11515346.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:696
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744385.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744385.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1172

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st932756.exe

    Filesize

    408KB

    MD5

    7152e78bfa0906109303630d8a5ada60

    SHA1

    c8bebfce660473bb5668105d138b442c066f91b9

    SHA256

    5f8e27b265bea96f1f364bae8d9217a57694e5394fdb704e91b4ffcf1a017471

    SHA512

    73eba88880ac839e10ddb3baa213b9a135ecd2e06af1d94d2c54db08109cb2a32ccdea00763ccac3b97cdcba5084983fa7a694ac2c3d1e591945cf3322d1e711

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st932756.exe

    Filesize

    408KB

    MD5

    7152e78bfa0906109303630d8a5ada60

    SHA1

    c8bebfce660473bb5668105d138b442c066f91b9

    SHA256

    5f8e27b265bea96f1f364bae8d9217a57694e5394fdb704e91b4ffcf1a017471

    SHA512

    73eba88880ac839e10ddb3baa213b9a135ecd2e06af1d94d2c54db08109cb2a32ccdea00763ccac3b97cdcba5084983fa7a694ac2c3d1e591945cf3322d1e711

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11515346.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11515346.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744385.exe

    Filesize

    360KB

    MD5

    67a0a981e72175a44d5435a6c2eaac73

    SHA1

    dcd9adfcd6cbca66f53988577dcbd141ac456043

    SHA256

    020a53857bb0f3cf77539f5ecfc8dd820ba3642e92271c1900e724c9056a5040

    SHA512

    e42bd9e68330ca0d32d91bd13bf24b37317ddedc97b0d6a291fb1a4da3079049b3afc70b4107423f494cb0801c5084604cf782e941ffb1f0338e275ed42a2cfc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744385.exe

    Filesize

    360KB

    MD5

    67a0a981e72175a44d5435a6c2eaac73

    SHA1

    dcd9adfcd6cbca66f53988577dcbd141ac456043

    SHA256

    020a53857bb0f3cf77539f5ecfc8dd820ba3642e92271c1900e724c9056a5040

    SHA512

    e42bd9e68330ca0d32d91bd13bf24b37317ddedc97b0d6a291fb1a4da3079049b3afc70b4107423f494cb0801c5084604cf782e941ffb1f0338e275ed42a2cfc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744385.exe

    Filesize

    360KB

    MD5

    67a0a981e72175a44d5435a6c2eaac73

    SHA1

    dcd9adfcd6cbca66f53988577dcbd141ac456043

    SHA256

    020a53857bb0f3cf77539f5ecfc8dd820ba3642e92271c1900e724c9056a5040

    SHA512

    e42bd9e68330ca0d32d91bd13bf24b37317ddedc97b0d6a291fb1a4da3079049b3afc70b4107423f494cb0801c5084604cf782e941ffb1f0338e275ed42a2cfc

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st932756.exe

    Filesize

    408KB

    MD5

    7152e78bfa0906109303630d8a5ada60

    SHA1

    c8bebfce660473bb5668105d138b442c066f91b9

    SHA256

    5f8e27b265bea96f1f364bae8d9217a57694e5394fdb704e91b4ffcf1a017471

    SHA512

    73eba88880ac839e10ddb3baa213b9a135ecd2e06af1d94d2c54db08109cb2a32ccdea00763ccac3b97cdcba5084983fa7a694ac2c3d1e591945cf3322d1e711

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st932756.exe

    Filesize

    408KB

    MD5

    7152e78bfa0906109303630d8a5ada60

    SHA1

    c8bebfce660473bb5668105d138b442c066f91b9

    SHA256

    5f8e27b265bea96f1f364bae8d9217a57694e5394fdb704e91b4ffcf1a017471

    SHA512

    73eba88880ac839e10ddb3baa213b9a135ecd2e06af1d94d2c54db08109cb2a32ccdea00763ccac3b97cdcba5084983fa7a694ac2c3d1e591945cf3322d1e711

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\11515346.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744385.exe

    Filesize

    360KB

    MD5

    67a0a981e72175a44d5435a6c2eaac73

    SHA1

    dcd9adfcd6cbca66f53988577dcbd141ac456043

    SHA256

    020a53857bb0f3cf77539f5ecfc8dd820ba3642e92271c1900e724c9056a5040

    SHA512

    e42bd9e68330ca0d32d91bd13bf24b37317ddedc97b0d6a291fb1a4da3079049b3afc70b4107423f494cb0801c5084604cf782e941ffb1f0338e275ed42a2cfc

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744385.exe

    Filesize

    360KB

    MD5

    67a0a981e72175a44d5435a6c2eaac73

    SHA1

    dcd9adfcd6cbca66f53988577dcbd141ac456043

    SHA256

    020a53857bb0f3cf77539f5ecfc8dd820ba3642e92271c1900e724c9056a5040

    SHA512

    e42bd9e68330ca0d32d91bd13bf24b37317ddedc97b0d6a291fb1a4da3079049b3afc70b4107423f494cb0801c5084604cf782e941ffb1f0338e275ed42a2cfc

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744385.exe

    Filesize

    360KB

    MD5

    67a0a981e72175a44d5435a6c2eaac73

    SHA1

    dcd9adfcd6cbca66f53988577dcbd141ac456043

    SHA256

    020a53857bb0f3cf77539f5ecfc8dd820ba3642e92271c1900e724c9056a5040

    SHA512

    e42bd9e68330ca0d32d91bd13bf24b37317ddedc97b0d6a291fb1a4da3079049b3afc70b4107423f494cb0801c5084604cf782e941ffb1f0338e275ed42a2cfc

  • memory/696-72-0x0000000000840000-0x000000000084A000-memory.dmp

    Filesize

    40KB

  • memory/1172-101-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-109-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-85-0x00000000047F0000-0x000000000482A000-memory.dmp

    Filesize

    232KB

  • memory/1172-86-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-87-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-89-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-90-0x00000000073A0000-0x00000000073E0000-memory.dmp

    Filesize

    256KB

  • memory/1172-93-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-95-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-92-0x00000000073A0000-0x00000000073E0000-memory.dmp

    Filesize

    256KB

  • memory/1172-97-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-99-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-83-0x00000000002C0000-0x0000000000306000-memory.dmp

    Filesize

    280KB

  • memory/1172-103-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-105-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-115-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-113-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-117-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-111-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-84-0x00000000032A0000-0x00000000032DC000-memory.dmp

    Filesize

    240KB

  • memory/1172-107-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-119-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-121-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-123-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-125-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-127-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-129-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-131-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-133-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-135-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-137-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-139-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-141-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-143-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-145-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-147-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-149-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-151-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1172-881-0x00000000073A0000-0x00000000073E0000-memory.dmp

    Filesize

    256KB

  • memory/1172-883-0x00000000073A0000-0x00000000073E0000-memory.dmp

    Filesize

    256KB