Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    153s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 20:28

General

  • Target

    f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe

  • Size

    695KB

  • MD5

    48fd845cfc42eb2c4dc4cb03c23b27c8

  • SHA1

    3dc94ca3d3de1979949d0440cdc8103cff8064c6

  • SHA256

    f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec

  • SHA512

    fe3ee9eae6f79dbedea2d4ad6796d678bdae181a6be06c92876d7fc29de6359d907ae330d48727575ae26ea6129f83b5fc3996b04b000e38509f5a64a440af4d

  • SSDEEP

    12288:cy90kUn4MnLH7mFrehcUXUdun1Jr2Kix3xTHQq8sXowQDySyUdJOvmxQAE:cyBUnlnTaVehc23nqBxhTHQ1s4wQ7Aog

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe
    "C:\Users\Admin\AppData\Local\Temp\f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un624240.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un624240.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62353108.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62353108.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:468
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk268966.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk268966.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1672

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un624240.exe

    Filesize

    541KB

    MD5

    8164882881ededdf303d24ac9bb0324e

    SHA1

    d0d4beffc960cdc16706f8702597a7979794d0c4

    SHA256

    70a4131cd81bf886f1c34d81ab8c61197bc6b38017145cd584c412da74c78d2b

    SHA512

    aaad4fa2ad278f66d1aba044ab1e0dc852c1fadf99f93dfb32f63072ffb1594ff4351dbe9a87e0194705675a81312a08c50e2dc5c6c00851b3f5cfb1e1f19a54

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un624240.exe

    Filesize

    541KB

    MD5

    8164882881ededdf303d24ac9bb0324e

    SHA1

    d0d4beffc960cdc16706f8702597a7979794d0c4

    SHA256

    70a4131cd81bf886f1c34d81ab8c61197bc6b38017145cd584c412da74c78d2b

    SHA512

    aaad4fa2ad278f66d1aba044ab1e0dc852c1fadf99f93dfb32f63072ffb1594ff4351dbe9a87e0194705675a81312a08c50e2dc5c6c00851b3f5cfb1e1f19a54

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62353108.exe

    Filesize

    258KB

    MD5

    c671d754003666106ee51a7020e62adb

    SHA1

    6c05148cf75558a82598fd8357c86ed6bdcc9063

    SHA256

    1bd5d6df4d767ec3f59248526cb7efb4389f55ff56fe622f84c2ce05baf75d26

    SHA512

    5f8f93f7d830903688790182667955bbec924d36c1f732ca86bc2c4e7f8dffa0724de2e9df432924b685c1e13a64343c8cf7e080f44cc5f9bf3d0bcca6dc550b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62353108.exe

    Filesize

    258KB

    MD5

    c671d754003666106ee51a7020e62adb

    SHA1

    6c05148cf75558a82598fd8357c86ed6bdcc9063

    SHA256

    1bd5d6df4d767ec3f59248526cb7efb4389f55ff56fe622f84c2ce05baf75d26

    SHA512

    5f8f93f7d830903688790182667955bbec924d36c1f732ca86bc2c4e7f8dffa0724de2e9df432924b685c1e13a64343c8cf7e080f44cc5f9bf3d0bcca6dc550b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62353108.exe

    Filesize

    258KB

    MD5

    c671d754003666106ee51a7020e62adb

    SHA1

    6c05148cf75558a82598fd8357c86ed6bdcc9063

    SHA256

    1bd5d6df4d767ec3f59248526cb7efb4389f55ff56fe622f84c2ce05baf75d26

    SHA512

    5f8f93f7d830903688790182667955bbec924d36c1f732ca86bc2c4e7f8dffa0724de2e9df432924b685c1e13a64343c8cf7e080f44cc5f9bf3d0bcca6dc550b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk268966.exe

    Filesize

    340KB

    MD5

    b383cd533b43586dcabf78c4407c2c75

    SHA1

    7dd51a068af50c5887d0cf3f5fda4c029c50aea5

    SHA256

    31d8b295af54119bf497aff31d29d7fb63ebc7cc93834ff84524b68c86fdffff

    SHA512

    50e3024c047e1945ecd8ccec19a6865dde0d9fc6a7dccdba15848170c1dea69955de21e6d0c4b17209edbc395d522a689a1b79a106739cb83658be11cd1b6cea

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk268966.exe

    Filesize

    340KB

    MD5

    b383cd533b43586dcabf78c4407c2c75

    SHA1

    7dd51a068af50c5887d0cf3f5fda4c029c50aea5

    SHA256

    31d8b295af54119bf497aff31d29d7fb63ebc7cc93834ff84524b68c86fdffff

    SHA512

    50e3024c047e1945ecd8ccec19a6865dde0d9fc6a7dccdba15848170c1dea69955de21e6d0c4b17209edbc395d522a689a1b79a106739cb83658be11cd1b6cea

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk268966.exe

    Filesize

    340KB

    MD5

    b383cd533b43586dcabf78c4407c2c75

    SHA1

    7dd51a068af50c5887d0cf3f5fda4c029c50aea5

    SHA256

    31d8b295af54119bf497aff31d29d7fb63ebc7cc93834ff84524b68c86fdffff

    SHA512

    50e3024c047e1945ecd8ccec19a6865dde0d9fc6a7dccdba15848170c1dea69955de21e6d0c4b17209edbc395d522a689a1b79a106739cb83658be11cd1b6cea

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un624240.exe

    Filesize

    541KB

    MD5

    8164882881ededdf303d24ac9bb0324e

    SHA1

    d0d4beffc960cdc16706f8702597a7979794d0c4

    SHA256

    70a4131cd81bf886f1c34d81ab8c61197bc6b38017145cd584c412da74c78d2b

    SHA512

    aaad4fa2ad278f66d1aba044ab1e0dc852c1fadf99f93dfb32f63072ffb1594ff4351dbe9a87e0194705675a81312a08c50e2dc5c6c00851b3f5cfb1e1f19a54

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un624240.exe

    Filesize

    541KB

    MD5

    8164882881ededdf303d24ac9bb0324e

    SHA1

    d0d4beffc960cdc16706f8702597a7979794d0c4

    SHA256

    70a4131cd81bf886f1c34d81ab8c61197bc6b38017145cd584c412da74c78d2b

    SHA512

    aaad4fa2ad278f66d1aba044ab1e0dc852c1fadf99f93dfb32f63072ffb1594ff4351dbe9a87e0194705675a81312a08c50e2dc5c6c00851b3f5cfb1e1f19a54

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\62353108.exe

    Filesize

    258KB

    MD5

    c671d754003666106ee51a7020e62adb

    SHA1

    6c05148cf75558a82598fd8357c86ed6bdcc9063

    SHA256

    1bd5d6df4d767ec3f59248526cb7efb4389f55ff56fe622f84c2ce05baf75d26

    SHA512

    5f8f93f7d830903688790182667955bbec924d36c1f732ca86bc2c4e7f8dffa0724de2e9df432924b685c1e13a64343c8cf7e080f44cc5f9bf3d0bcca6dc550b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\62353108.exe

    Filesize

    258KB

    MD5

    c671d754003666106ee51a7020e62adb

    SHA1

    6c05148cf75558a82598fd8357c86ed6bdcc9063

    SHA256

    1bd5d6df4d767ec3f59248526cb7efb4389f55ff56fe622f84c2ce05baf75d26

    SHA512

    5f8f93f7d830903688790182667955bbec924d36c1f732ca86bc2c4e7f8dffa0724de2e9df432924b685c1e13a64343c8cf7e080f44cc5f9bf3d0bcca6dc550b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\62353108.exe

    Filesize

    258KB

    MD5

    c671d754003666106ee51a7020e62adb

    SHA1

    6c05148cf75558a82598fd8357c86ed6bdcc9063

    SHA256

    1bd5d6df4d767ec3f59248526cb7efb4389f55ff56fe622f84c2ce05baf75d26

    SHA512

    5f8f93f7d830903688790182667955bbec924d36c1f732ca86bc2c4e7f8dffa0724de2e9df432924b685c1e13a64343c8cf7e080f44cc5f9bf3d0bcca6dc550b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk268966.exe

    Filesize

    340KB

    MD5

    b383cd533b43586dcabf78c4407c2c75

    SHA1

    7dd51a068af50c5887d0cf3f5fda4c029c50aea5

    SHA256

    31d8b295af54119bf497aff31d29d7fb63ebc7cc93834ff84524b68c86fdffff

    SHA512

    50e3024c047e1945ecd8ccec19a6865dde0d9fc6a7dccdba15848170c1dea69955de21e6d0c4b17209edbc395d522a689a1b79a106739cb83658be11cd1b6cea

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk268966.exe

    Filesize

    340KB

    MD5

    b383cd533b43586dcabf78c4407c2c75

    SHA1

    7dd51a068af50c5887d0cf3f5fda4c029c50aea5

    SHA256

    31d8b295af54119bf497aff31d29d7fb63ebc7cc93834ff84524b68c86fdffff

    SHA512

    50e3024c047e1945ecd8ccec19a6865dde0d9fc6a7dccdba15848170c1dea69955de21e6d0c4b17209edbc395d522a689a1b79a106739cb83658be11cd1b6cea

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk268966.exe

    Filesize

    340KB

    MD5

    b383cd533b43586dcabf78c4407c2c75

    SHA1

    7dd51a068af50c5887d0cf3f5fda4c029c50aea5

    SHA256

    31d8b295af54119bf497aff31d29d7fb63ebc7cc93834ff84524b68c86fdffff

    SHA512

    50e3024c047e1945ecd8ccec19a6865dde0d9fc6a7dccdba15848170c1dea69955de21e6d0c4b17209edbc395d522a689a1b79a106739cb83658be11cd1b6cea

  • memory/468-110-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/468-87-0x00000000032E0000-0x00000000032F3000-memory.dmp

    Filesize

    76KB

  • memory/468-89-0x00000000032E0000-0x00000000032F3000-memory.dmp

    Filesize

    76KB

  • memory/468-91-0x00000000032E0000-0x00000000032F3000-memory.dmp

    Filesize

    76KB

  • memory/468-93-0x00000000032E0000-0x00000000032F3000-memory.dmp

    Filesize

    76KB

  • memory/468-95-0x00000000032E0000-0x00000000032F3000-memory.dmp

    Filesize

    76KB

  • memory/468-97-0x00000000032E0000-0x00000000032F3000-memory.dmp

    Filesize

    76KB

  • memory/468-99-0x00000000032E0000-0x00000000032F3000-memory.dmp

    Filesize

    76KB

  • memory/468-101-0x00000000032E0000-0x00000000032F3000-memory.dmp

    Filesize

    76KB

  • memory/468-105-0x00000000032E0000-0x00000000032F3000-memory.dmp

    Filesize

    76KB

  • memory/468-103-0x00000000032E0000-0x00000000032F3000-memory.dmp

    Filesize

    76KB

  • memory/468-109-0x00000000032E0000-0x00000000032F3000-memory.dmp

    Filesize

    76KB

  • memory/468-107-0x00000000032E0000-0x00000000032F3000-memory.dmp

    Filesize

    76KB

  • memory/468-85-0x00000000032E0000-0x00000000032F3000-memory.dmp

    Filesize

    76KB

  • memory/468-114-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/468-83-0x00000000032E0000-0x00000000032F3000-memory.dmp

    Filesize

    76KB

  • memory/468-82-0x00000000032E0000-0x00000000032F3000-memory.dmp

    Filesize

    76KB

  • memory/468-80-0x0000000000240000-0x000000000026D000-memory.dmp

    Filesize

    180KB

  • memory/468-81-0x0000000007270000-0x00000000072B0000-memory.dmp

    Filesize

    256KB

  • memory/468-79-0x00000000032E0000-0x00000000032F8000-memory.dmp

    Filesize

    96KB

  • memory/468-78-0x0000000002C20000-0x0000000002C3A000-memory.dmp

    Filesize

    104KB

  • memory/1672-127-0x00000000046A0000-0x00000000046D5000-memory.dmp

    Filesize

    212KB

  • memory/1672-150-0x00000000046A0000-0x00000000046D5000-memory.dmp

    Filesize

    212KB

  • memory/1672-125-0x0000000004660000-0x000000000469C000-memory.dmp

    Filesize

    240KB

  • memory/1672-128-0x00000000046A0000-0x00000000046D5000-memory.dmp

    Filesize

    212KB

  • memory/1672-130-0x00000000046A0000-0x00000000046D5000-memory.dmp

    Filesize

    212KB

  • memory/1672-132-0x00000000046A0000-0x00000000046D5000-memory.dmp

    Filesize

    212KB

  • memory/1672-134-0x00000000046A0000-0x00000000046D5000-memory.dmp

    Filesize

    212KB

  • memory/1672-136-0x00000000046A0000-0x00000000046D5000-memory.dmp

    Filesize

    212KB

  • memory/1672-138-0x00000000046A0000-0x00000000046D5000-memory.dmp

    Filesize

    212KB

  • memory/1672-140-0x00000000046A0000-0x00000000046D5000-memory.dmp

    Filesize

    212KB

  • memory/1672-142-0x00000000046A0000-0x00000000046D5000-memory.dmp

    Filesize

    212KB

  • memory/1672-144-0x00000000046A0000-0x00000000046D5000-memory.dmp

    Filesize

    212KB

  • memory/1672-146-0x00000000046A0000-0x00000000046D5000-memory.dmp

    Filesize

    212KB

  • memory/1672-126-0x00000000046A0000-0x00000000046DA000-memory.dmp

    Filesize

    232KB

  • memory/1672-148-0x00000000046A0000-0x00000000046D5000-memory.dmp

    Filesize

    212KB

  • memory/1672-152-0x00000000046A0000-0x00000000046D5000-memory.dmp

    Filesize

    212KB

  • memory/1672-156-0x00000000046A0000-0x00000000046D5000-memory.dmp

    Filesize

    212KB

  • memory/1672-154-0x00000000046A0000-0x00000000046D5000-memory.dmp

    Filesize

    212KB

  • memory/1672-526-0x0000000000240000-0x0000000000286000-memory.dmp

    Filesize

    280KB

  • memory/1672-528-0x0000000007230000-0x0000000007270000-memory.dmp

    Filesize

    256KB

  • memory/1672-530-0x0000000007230000-0x0000000007270000-memory.dmp

    Filesize

    256KB

  • memory/1672-532-0x0000000007230000-0x0000000007270000-memory.dmp

    Filesize

    256KB

  • memory/1672-923-0x0000000007230000-0x0000000007270000-memory.dmp

    Filesize

    256KB

  • memory/1672-925-0x0000000007230000-0x0000000007270000-memory.dmp

    Filesize

    256KB

  • memory/1672-926-0x0000000007230000-0x0000000007270000-memory.dmp

    Filesize

    256KB

  • memory/1672-928-0x0000000007230000-0x0000000007270000-memory.dmp

    Filesize

    256KB