Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 20:28
Static task
static1
Behavioral task
behavioral1
Sample
f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe
Resource
win10v2004-20230220-en
General
-
Target
f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe
-
Size
695KB
-
MD5
48fd845cfc42eb2c4dc4cb03c23b27c8
-
SHA1
3dc94ca3d3de1979949d0440cdc8103cff8064c6
-
SHA256
f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec
-
SHA512
fe3ee9eae6f79dbedea2d4ad6796d678bdae181a6be06c92876d7fc29de6359d907ae330d48727575ae26ea6129f83b5fc3996b04b000e38509f5a64a440af4d
-
SSDEEP
12288:cy90kUn4MnLH7mFrehcUXUdun1Jr2Kix3xTHQq8sXowQDySyUdJOvmxQAE:cyBUnlnTaVehc23nqBxhTHQ1s4wQ7Aog
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 62353108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 62353108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 62353108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 62353108.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 62353108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 62353108.exe -
Executes dropped EXE 3 IoCs
pid Process 1212 un624240.exe 468 62353108.exe 1672 rk268966.exe -
Loads dropped DLL 8 IoCs
pid Process 1772 f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe 1212 un624240.exe 1212 un624240.exe 1212 un624240.exe 468 62353108.exe 1212 un624240.exe 1212 un624240.exe 1672 rk268966.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 62353108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 62353108.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un624240.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un624240.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 468 62353108.exe 468 62353108.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 468 62353108.exe Token: SeDebugPrivilege 1672 rk268966.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1772 wrote to memory of 1212 1772 f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe 28 PID 1772 wrote to memory of 1212 1772 f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe 28 PID 1772 wrote to memory of 1212 1772 f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe 28 PID 1772 wrote to memory of 1212 1772 f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe 28 PID 1772 wrote to memory of 1212 1772 f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe 28 PID 1772 wrote to memory of 1212 1772 f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe 28 PID 1772 wrote to memory of 1212 1772 f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe 28 PID 1212 wrote to memory of 468 1212 un624240.exe 29 PID 1212 wrote to memory of 468 1212 un624240.exe 29 PID 1212 wrote to memory of 468 1212 un624240.exe 29 PID 1212 wrote to memory of 468 1212 un624240.exe 29 PID 1212 wrote to memory of 468 1212 un624240.exe 29 PID 1212 wrote to memory of 468 1212 un624240.exe 29 PID 1212 wrote to memory of 468 1212 un624240.exe 29 PID 1212 wrote to memory of 1672 1212 un624240.exe 30 PID 1212 wrote to memory of 1672 1212 un624240.exe 30 PID 1212 wrote to memory of 1672 1212 un624240.exe 30 PID 1212 wrote to memory of 1672 1212 un624240.exe 30 PID 1212 wrote to memory of 1672 1212 un624240.exe 30 PID 1212 wrote to memory of 1672 1212 un624240.exe 30 PID 1212 wrote to memory of 1672 1212 un624240.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe"C:\Users\Admin\AppData\Local\Temp\f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un624240.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un624240.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62353108.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62353108.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:468
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk268966.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk268966.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541KB
MD58164882881ededdf303d24ac9bb0324e
SHA1d0d4beffc960cdc16706f8702597a7979794d0c4
SHA25670a4131cd81bf886f1c34d81ab8c61197bc6b38017145cd584c412da74c78d2b
SHA512aaad4fa2ad278f66d1aba044ab1e0dc852c1fadf99f93dfb32f63072ffb1594ff4351dbe9a87e0194705675a81312a08c50e2dc5c6c00851b3f5cfb1e1f19a54
-
Filesize
541KB
MD58164882881ededdf303d24ac9bb0324e
SHA1d0d4beffc960cdc16706f8702597a7979794d0c4
SHA25670a4131cd81bf886f1c34d81ab8c61197bc6b38017145cd584c412da74c78d2b
SHA512aaad4fa2ad278f66d1aba044ab1e0dc852c1fadf99f93dfb32f63072ffb1594ff4351dbe9a87e0194705675a81312a08c50e2dc5c6c00851b3f5cfb1e1f19a54
-
Filesize
258KB
MD5c671d754003666106ee51a7020e62adb
SHA16c05148cf75558a82598fd8357c86ed6bdcc9063
SHA2561bd5d6df4d767ec3f59248526cb7efb4389f55ff56fe622f84c2ce05baf75d26
SHA5125f8f93f7d830903688790182667955bbec924d36c1f732ca86bc2c4e7f8dffa0724de2e9df432924b685c1e13a64343c8cf7e080f44cc5f9bf3d0bcca6dc550b
-
Filesize
258KB
MD5c671d754003666106ee51a7020e62adb
SHA16c05148cf75558a82598fd8357c86ed6bdcc9063
SHA2561bd5d6df4d767ec3f59248526cb7efb4389f55ff56fe622f84c2ce05baf75d26
SHA5125f8f93f7d830903688790182667955bbec924d36c1f732ca86bc2c4e7f8dffa0724de2e9df432924b685c1e13a64343c8cf7e080f44cc5f9bf3d0bcca6dc550b
-
Filesize
258KB
MD5c671d754003666106ee51a7020e62adb
SHA16c05148cf75558a82598fd8357c86ed6bdcc9063
SHA2561bd5d6df4d767ec3f59248526cb7efb4389f55ff56fe622f84c2ce05baf75d26
SHA5125f8f93f7d830903688790182667955bbec924d36c1f732ca86bc2c4e7f8dffa0724de2e9df432924b685c1e13a64343c8cf7e080f44cc5f9bf3d0bcca6dc550b
-
Filesize
340KB
MD5b383cd533b43586dcabf78c4407c2c75
SHA17dd51a068af50c5887d0cf3f5fda4c029c50aea5
SHA25631d8b295af54119bf497aff31d29d7fb63ebc7cc93834ff84524b68c86fdffff
SHA51250e3024c047e1945ecd8ccec19a6865dde0d9fc6a7dccdba15848170c1dea69955de21e6d0c4b17209edbc395d522a689a1b79a106739cb83658be11cd1b6cea
-
Filesize
340KB
MD5b383cd533b43586dcabf78c4407c2c75
SHA17dd51a068af50c5887d0cf3f5fda4c029c50aea5
SHA25631d8b295af54119bf497aff31d29d7fb63ebc7cc93834ff84524b68c86fdffff
SHA51250e3024c047e1945ecd8ccec19a6865dde0d9fc6a7dccdba15848170c1dea69955de21e6d0c4b17209edbc395d522a689a1b79a106739cb83658be11cd1b6cea
-
Filesize
340KB
MD5b383cd533b43586dcabf78c4407c2c75
SHA17dd51a068af50c5887d0cf3f5fda4c029c50aea5
SHA25631d8b295af54119bf497aff31d29d7fb63ebc7cc93834ff84524b68c86fdffff
SHA51250e3024c047e1945ecd8ccec19a6865dde0d9fc6a7dccdba15848170c1dea69955de21e6d0c4b17209edbc395d522a689a1b79a106739cb83658be11cd1b6cea
-
Filesize
541KB
MD58164882881ededdf303d24ac9bb0324e
SHA1d0d4beffc960cdc16706f8702597a7979794d0c4
SHA25670a4131cd81bf886f1c34d81ab8c61197bc6b38017145cd584c412da74c78d2b
SHA512aaad4fa2ad278f66d1aba044ab1e0dc852c1fadf99f93dfb32f63072ffb1594ff4351dbe9a87e0194705675a81312a08c50e2dc5c6c00851b3f5cfb1e1f19a54
-
Filesize
541KB
MD58164882881ededdf303d24ac9bb0324e
SHA1d0d4beffc960cdc16706f8702597a7979794d0c4
SHA25670a4131cd81bf886f1c34d81ab8c61197bc6b38017145cd584c412da74c78d2b
SHA512aaad4fa2ad278f66d1aba044ab1e0dc852c1fadf99f93dfb32f63072ffb1594ff4351dbe9a87e0194705675a81312a08c50e2dc5c6c00851b3f5cfb1e1f19a54
-
Filesize
258KB
MD5c671d754003666106ee51a7020e62adb
SHA16c05148cf75558a82598fd8357c86ed6bdcc9063
SHA2561bd5d6df4d767ec3f59248526cb7efb4389f55ff56fe622f84c2ce05baf75d26
SHA5125f8f93f7d830903688790182667955bbec924d36c1f732ca86bc2c4e7f8dffa0724de2e9df432924b685c1e13a64343c8cf7e080f44cc5f9bf3d0bcca6dc550b
-
Filesize
258KB
MD5c671d754003666106ee51a7020e62adb
SHA16c05148cf75558a82598fd8357c86ed6bdcc9063
SHA2561bd5d6df4d767ec3f59248526cb7efb4389f55ff56fe622f84c2ce05baf75d26
SHA5125f8f93f7d830903688790182667955bbec924d36c1f732ca86bc2c4e7f8dffa0724de2e9df432924b685c1e13a64343c8cf7e080f44cc5f9bf3d0bcca6dc550b
-
Filesize
258KB
MD5c671d754003666106ee51a7020e62adb
SHA16c05148cf75558a82598fd8357c86ed6bdcc9063
SHA2561bd5d6df4d767ec3f59248526cb7efb4389f55ff56fe622f84c2ce05baf75d26
SHA5125f8f93f7d830903688790182667955bbec924d36c1f732ca86bc2c4e7f8dffa0724de2e9df432924b685c1e13a64343c8cf7e080f44cc5f9bf3d0bcca6dc550b
-
Filesize
340KB
MD5b383cd533b43586dcabf78c4407c2c75
SHA17dd51a068af50c5887d0cf3f5fda4c029c50aea5
SHA25631d8b295af54119bf497aff31d29d7fb63ebc7cc93834ff84524b68c86fdffff
SHA51250e3024c047e1945ecd8ccec19a6865dde0d9fc6a7dccdba15848170c1dea69955de21e6d0c4b17209edbc395d522a689a1b79a106739cb83658be11cd1b6cea
-
Filesize
340KB
MD5b383cd533b43586dcabf78c4407c2c75
SHA17dd51a068af50c5887d0cf3f5fda4c029c50aea5
SHA25631d8b295af54119bf497aff31d29d7fb63ebc7cc93834ff84524b68c86fdffff
SHA51250e3024c047e1945ecd8ccec19a6865dde0d9fc6a7dccdba15848170c1dea69955de21e6d0c4b17209edbc395d522a689a1b79a106739cb83658be11cd1b6cea
-
Filesize
340KB
MD5b383cd533b43586dcabf78c4407c2c75
SHA17dd51a068af50c5887d0cf3f5fda4c029c50aea5
SHA25631d8b295af54119bf497aff31d29d7fb63ebc7cc93834ff84524b68c86fdffff
SHA51250e3024c047e1945ecd8ccec19a6865dde0d9fc6a7dccdba15848170c1dea69955de21e6d0c4b17209edbc395d522a689a1b79a106739cb83658be11cd1b6cea