Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 20:14

General

  • Target

    e7b83919b7a4b9b57ecdc38a3b79c0022aa7c60cd270e2b0c57e1eeddb49796e.exe

  • Size

    612KB

  • MD5

    a8d3d81789d1e650804aac303b3dff34

  • SHA1

    4276cf621c752618a4a9710181b1e5f89ca628eb

  • SHA256

    e7b83919b7a4b9b57ecdc38a3b79c0022aa7c60cd270e2b0c57e1eeddb49796e

  • SHA512

    f93031e1025f1e0685a7e93e4e848033ffdfb25b94b27d99acac4860e106b398a25f93e2d26bcf636c6773663dd170384be16e290e2ebb69c8836a175926aff1

  • SSDEEP

    12288:Vy90DVk9qi2NzoRcdBEnw2yjFwq2jELg550Rr:VyaVk9qi2NMRcYxyjC2LQi1

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7b83919b7a4b9b57ecdc38a3b79c0022aa7c60cd270e2b0c57e1eeddb49796e.exe
    "C:\Users\Admin\AppData\Local\Temp\e7b83919b7a4b9b57ecdc38a3b79c0022aa7c60cd270e2b0c57e1eeddb49796e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1384
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st659731.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st659731.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\17534350.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\17534350.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1496
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp584470.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp584470.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:900

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st659731.exe

    Filesize

    458KB

    MD5

    41148b723e735c9105ac97c518b9b55e

    SHA1

    33877fe6bf4c650cf640d2c664feff2d554c439d

    SHA256

    f5dcb28be9ed5999dc058fad517ce4d57f0fe352e530465e242e1a2a07502aa4

    SHA512

    e340d9566272d69e1bee9879c3eaf835dc10405230f53e3866bd4f7d9615e57dcb4076a190ff37c9bc6376d069311f64108af2df7755a335ce827c058d4b4091

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st659731.exe

    Filesize

    458KB

    MD5

    41148b723e735c9105ac97c518b9b55e

    SHA1

    33877fe6bf4c650cf640d2c664feff2d554c439d

    SHA256

    f5dcb28be9ed5999dc058fad517ce4d57f0fe352e530465e242e1a2a07502aa4

    SHA512

    e340d9566272d69e1bee9879c3eaf835dc10405230f53e3866bd4f7d9615e57dcb4076a190ff37c9bc6376d069311f64108af2df7755a335ce827c058d4b4091

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\17534350.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\17534350.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp584470.exe

    Filesize

    459KB

    MD5

    3b98b0ea168a6300618f8dedef6a7b16

    SHA1

    82446468d9ce7820de388a1b222aa0d96083dfe5

    SHA256

    decac5d17ca93855205781b9719c841e23028a0d663ac2b5ee47521f1c1b8d91

    SHA512

    8f60bf68e4528c4b0bf0a275fc827ad0111dbf6fcec5185b9e4639af3e2813314c985354b34314cf9d2531b7e962b24bb76ec16fe21c32150b1be08093579fb8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp584470.exe

    Filesize

    459KB

    MD5

    3b98b0ea168a6300618f8dedef6a7b16

    SHA1

    82446468d9ce7820de388a1b222aa0d96083dfe5

    SHA256

    decac5d17ca93855205781b9719c841e23028a0d663ac2b5ee47521f1c1b8d91

    SHA512

    8f60bf68e4528c4b0bf0a275fc827ad0111dbf6fcec5185b9e4639af3e2813314c985354b34314cf9d2531b7e962b24bb76ec16fe21c32150b1be08093579fb8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp584470.exe

    Filesize

    459KB

    MD5

    3b98b0ea168a6300618f8dedef6a7b16

    SHA1

    82446468d9ce7820de388a1b222aa0d96083dfe5

    SHA256

    decac5d17ca93855205781b9719c841e23028a0d663ac2b5ee47521f1c1b8d91

    SHA512

    8f60bf68e4528c4b0bf0a275fc827ad0111dbf6fcec5185b9e4639af3e2813314c985354b34314cf9d2531b7e962b24bb76ec16fe21c32150b1be08093579fb8

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st659731.exe

    Filesize

    458KB

    MD5

    41148b723e735c9105ac97c518b9b55e

    SHA1

    33877fe6bf4c650cf640d2c664feff2d554c439d

    SHA256

    f5dcb28be9ed5999dc058fad517ce4d57f0fe352e530465e242e1a2a07502aa4

    SHA512

    e340d9566272d69e1bee9879c3eaf835dc10405230f53e3866bd4f7d9615e57dcb4076a190ff37c9bc6376d069311f64108af2df7755a335ce827c058d4b4091

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st659731.exe

    Filesize

    458KB

    MD5

    41148b723e735c9105ac97c518b9b55e

    SHA1

    33877fe6bf4c650cf640d2c664feff2d554c439d

    SHA256

    f5dcb28be9ed5999dc058fad517ce4d57f0fe352e530465e242e1a2a07502aa4

    SHA512

    e340d9566272d69e1bee9879c3eaf835dc10405230f53e3866bd4f7d9615e57dcb4076a190ff37c9bc6376d069311f64108af2df7755a335ce827c058d4b4091

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\17534350.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp584470.exe

    Filesize

    459KB

    MD5

    3b98b0ea168a6300618f8dedef6a7b16

    SHA1

    82446468d9ce7820de388a1b222aa0d96083dfe5

    SHA256

    decac5d17ca93855205781b9719c841e23028a0d663ac2b5ee47521f1c1b8d91

    SHA512

    8f60bf68e4528c4b0bf0a275fc827ad0111dbf6fcec5185b9e4639af3e2813314c985354b34314cf9d2531b7e962b24bb76ec16fe21c32150b1be08093579fb8

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp584470.exe

    Filesize

    459KB

    MD5

    3b98b0ea168a6300618f8dedef6a7b16

    SHA1

    82446468d9ce7820de388a1b222aa0d96083dfe5

    SHA256

    decac5d17ca93855205781b9719c841e23028a0d663ac2b5ee47521f1c1b8d91

    SHA512

    8f60bf68e4528c4b0bf0a275fc827ad0111dbf6fcec5185b9e4639af3e2813314c985354b34314cf9d2531b7e962b24bb76ec16fe21c32150b1be08093579fb8

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp584470.exe

    Filesize

    459KB

    MD5

    3b98b0ea168a6300618f8dedef6a7b16

    SHA1

    82446468d9ce7820de388a1b222aa0d96083dfe5

    SHA256

    decac5d17ca93855205781b9719c841e23028a0d663ac2b5ee47521f1c1b8d91

    SHA512

    8f60bf68e4528c4b0bf0a275fc827ad0111dbf6fcec5185b9e4639af3e2813314c985354b34314cf9d2531b7e962b24bb76ec16fe21c32150b1be08093579fb8

  • memory/900-104-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-120-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-84-0x0000000004D30000-0x0000000004D6A000-memory.dmp

    Filesize

    232KB

  • memory/900-85-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-86-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-88-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-90-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-92-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-94-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-96-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-98-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-100-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-102-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-883-0x0000000004DC0000-0x0000000004E00000-memory.dmp

    Filesize

    256KB

  • memory/900-106-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-108-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-110-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-112-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-114-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-116-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-118-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-83-0x0000000004CF0000-0x0000000004D2C000-memory.dmp

    Filesize

    240KB

  • memory/900-122-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-124-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-126-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-128-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-130-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-132-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-134-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-136-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-138-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-140-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-142-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-144-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-146-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-148-0x0000000004D30000-0x0000000004D65000-memory.dmp

    Filesize

    212KB

  • memory/900-510-0x00000000003A0000-0x00000000003E6000-memory.dmp

    Filesize

    280KB

  • memory/900-512-0x0000000004DC0000-0x0000000004E00000-memory.dmp

    Filesize

    256KB

  • memory/900-514-0x0000000004DC0000-0x0000000004E00000-memory.dmp

    Filesize

    256KB

  • memory/900-880-0x0000000004DC0000-0x0000000004E00000-memory.dmp

    Filesize

    256KB

  • memory/1496-72-0x0000000001020000-0x000000000102A000-memory.dmp

    Filesize

    40KB