Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 19:40 UTC

General

  • Target

    cd76a2f90473dae4a54925032783ba222535ae7c981a2672989cf3964cbc29c8.exe

  • Size

    701KB

  • MD5

    e76f6bf34e41c01ab28e7c9da86d0a0a

  • SHA1

    70c0594b7abb241cacb2d7abe75725a6957f06ba

  • SHA256

    cd76a2f90473dae4a54925032783ba222535ae7c981a2672989cf3964cbc29c8

  • SHA512

    31fa1068a7b1ba84f7a7bdd7d38fddc38a893209e775c95e6325ab5be8c7993c2c29568fd569e78d0e68a66dfb1031317e91ae95f4058fd09f648ab728aebe53

  • SSDEEP

    12288:Ay90eWTbXxZXbZnUSLUPkEWDOMqpTfR3+GhKzVpARuB6q2E3BLimrny8V:AyxgXxZX1n/LDEWDOfJIpARuB6Y

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd76a2f90473dae4a54925032783ba222535ae7c981a2672989cf3964cbc29c8.exe
    "C:\Users\Admin\AppData\Local\Temp\cd76a2f90473dae4a54925032783ba222535ae7c981a2672989cf3964cbc29c8.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un038927.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un038927.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:956
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91905041.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91905041.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:540
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk315025.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk315025.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1004

Network

    No results found
  • 185.161.248.143:38452
    rk315025.exe
    152 B
    3
  • 185.161.248.143:38452
    rk315025.exe
    152 B
    3
  • 185.161.248.143:38452
    rk315025.exe
    152 B
    3
  • 185.161.248.143:38452
    rk315025.exe
    152 B
    3
  • 185.161.248.143:38452
    rk315025.exe
    152 B
    3
  • 185.161.248.143:38452
    rk315025.exe
    152 B
    3
No results found

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un038927.exe

    Filesize

    547KB

    MD5

    d1c141d7d363fd009940fd6b3cce6d64

    SHA1

    b20606df5cb4d9ddf955eba229f3ae54342e19ab

    SHA256

    49484fe66a47dde6ef4041bd087e96b4f0a1617014fac9d50734d52f05a69ba7

    SHA512

    bc87705991f101625324b9fa1a85491d526aa2cb97b0eed658cc5328b275e4f2b22b416bd820e7aef718baee8cae7a7f097e4f24c284f211e31e39690d24b3a0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un038927.exe

    Filesize

    547KB

    MD5

    d1c141d7d363fd009940fd6b3cce6d64

    SHA1

    b20606df5cb4d9ddf955eba229f3ae54342e19ab

    SHA256

    49484fe66a47dde6ef4041bd087e96b4f0a1617014fac9d50734d52f05a69ba7

    SHA512

    bc87705991f101625324b9fa1a85491d526aa2cb97b0eed658cc5328b275e4f2b22b416bd820e7aef718baee8cae7a7f097e4f24c284f211e31e39690d24b3a0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91905041.exe

    Filesize

    269KB

    MD5

    12c7bcdf1a87bc1c994793f4ab83895e

    SHA1

    0d9d01d056d232e4f903fcc8e4ccc687a5ada59d

    SHA256

    b5ec2d3fb48c7fed056509f9cd37f3334d4d0574231d28333edf3c71687e9aa3

    SHA512

    9515f7270681ffe21fd465c505d0d05de594292a43d35f4e4dba91961da2f5d911ea29cdf31846858e460b2070e1a56871e88712cab5e71bcb5e4520b7016dcd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91905041.exe

    Filesize

    269KB

    MD5

    12c7bcdf1a87bc1c994793f4ab83895e

    SHA1

    0d9d01d056d232e4f903fcc8e4ccc687a5ada59d

    SHA256

    b5ec2d3fb48c7fed056509f9cd37f3334d4d0574231d28333edf3c71687e9aa3

    SHA512

    9515f7270681ffe21fd465c505d0d05de594292a43d35f4e4dba91961da2f5d911ea29cdf31846858e460b2070e1a56871e88712cab5e71bcb5e4520b7016dcd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91905041.exe

    Filesize

    269KB

    MD5

    12c7bcdf1a87bc1c994793f4ab83895e

    SHA1

    0d9d01d056d232e4f903fcc8e4ccc687a5ada59d

    SHA256

    b5ec2d3fb48c7fed056509f9cd37f3334d4d0574231d28333edf3c71687e9aa3

    SHA512

    9515f7270681ffe21fd465c505d0d05de594292a43d35f4e4dba91961da2f5d911ea29cdf31846858e460b2070e1a56871e88712cab5e71bcb5e4520b7016dcd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk315025.exe

    Filesize

    353KB

    MD5

    522c4ca06d3787fbb376fe56bc2b5931

    SHA1

    3fc1428257f6ec47716fe0ae22054f135aaa4d5f

    SHA256

    5c8b5b6abac933b35292d512ade991c92e01608025087a10fd2110f9153ebb25

    SHA512

    713ee4e6f291155b2b02f11131a6778e99dcbd11aa2603d9f333f4bdb07dec0d0396f510d92d29dcc59eaef6b005282f14936838485f532192c57f0722949d7d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk315025.exe

    Filesize

    353KB

    MD5

    522c4ca06d3787fbb376fe56bc2b5931

    SHA1

    3fc1428257f6ec47716fe0ae22054f135aaa4d5f

    SHA256

    5c8b5b6abac933b35292d512ade991c92e01608025087a10fd2110f9153ebb25

    SHA512

    713ee4e6f291155b2b02f11131a6778e99dcbd11aa2603d9f333f4bdb07dec0d0396f510d92d29dcc59eaef6b005282f14936838485f532192c57f0722949d7d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk315025.exe

    Filesize

    353KB

    MD5

    522c4ca06d3787fbb376fe56bc2b5931

    SHA1

    3fc1428257f6ec47716fe0ae22054f135aaa4d5f

    SHA256

    5c8b5b6abac933b35292d512ade991c92e01608025087a10fd2110f9153ebb25

    SHA512

    713ee4e6f291155b2b02f11131a6778e99dcbd11aa2603d9f333f4bdb07dec0d0396f510d92d29dcc59eaef6b005282f14936838485f532192c57f0722949d7d

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un038927.exe

    Filesize

    547KB

    MD5

    d1c141d7d363fd009940fd6b3cce6d64

    SHA1

    b20606df5cb4d9ddf955eba229f3ae54342e19ab

    SHA256

    49484fe66a47dde6ef4041bd087e96b4f0a1617014fac9d50734d52f05a69ba7

    SHA512

    bc87705991f101625324b9fa1a85491d526aa2cb97b0eed658cc5328b275e4f2b22b416bd820e7aef718baee8cae7a7f097e4f24c284f211e31e39690d24b3a0

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un038927.exe

    Filesize

    547KB

    MD5

    d1c141d7d363fd009940fd6b3cce6d64

    SHA1

    b20606df5cb4d9ddf955eba229f3ae54342e19ab

    SHA256

    49484fe66a47dde6ef4041bd087e96b4f0a1617014fac9d50734d52f05a69ba7

    SHA512

    bc87705991f101625324b9fa1a85491d526aa2cb97b0eed658cc5328b275e4f2b22b416bd820e7aef718baee8cae7a7f097e4f24c284f211e31e39690d24b3a0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\91905041.exe

    Filesize

    269KB

    MD5

    12c7bcdf1a87bc1c994793f4ab83895e

    SHA1

    0d9d01d056d232e4f903fcc8e4ccc687a5ada59d

    SHA256

    b5ec2d3fb48c7fed056509f9cd37f3334d4d0574231d28333edf3c71687e9aa3

    SHA512

    9515f7270681ffe21fd465c505d0d05de594292a43d35f4e4dba91961da2f5d911ea29cdf31846858e460b2070e1a56871e88712cab5e71bcb5e4520b7016dcd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\91905041.exe

    Filesize

    269KB

    MD5

    12c7bcdf1a87bc1c994793f4ab83895e

    SHA1

    0d9d01d056d232e4f903fcc8e4ccc687a5ada59d

    SHA256

    b5ec2d3fb48c7fed056509f9cd37f3334d4d0574231d28333edf3c71687e9aa3

    SHA512

    9515f7270681ffe21fd465c505d0d05de594292a43d35f4e4dba91961da2f5d911ea29cdf31846858e460b2070e1a56871e88712cab5e71bcb5e4520b7016dcd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\91905041.exe

    Filesize

    269KB

    MD5

    12c7bcdf1a87bc1c994793f4ab83895e

    SHA1

    0d9d01d056d232e4f903fcc8e4ccc687a5ada59d

    SHA256

    b5ec2d3fb48c7fed056509f9cd37f3334d4d0574231d28333edf3c71687e9aa3

    SHA512

    9515f7270681ffe21fd465c505d0d05de594292a43d35f4e4dba91961da2f5d911ea29cdf31846858e460b2070e1a56871e88712cab5e71bcb5e4520b7016dcd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk315025.exe

    Filesize

    353KB

    MD5

    522c4ca06d3787fbb376fe56bc2b5931

    SHA1

    3fc1428257f6ec47716fe0ae22054f135aaa4d5f

    SHA256

    5c8b5b6abac933b35292d512ade991c92e01608025087a10fd2110f9153ebb25

    SHA512

    713ee4e6f291155b2b02f11131a6778e99dcbd11aa2603d9f333f4bdb07dec0d0396f510d92d29dcc59eaef6b005282f14936838485f532192c57f0722949d7d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk315025.exe

    Filesize

    353KB

    MD5

    522c4ca06d3787fbb376fe56bc2b5931

    SHA1

    3fc1428257f6ec47716fe0ae22054f135aaa4d5f

    SHA256

    5c8b5b6abac933b35292d512ade991c92e01608025087a10fd2110f9153ebb25

    SHA512

    713ee4e6f291155b2b02f11131a6778e99dcbd11aa2603d9f333f4bdb07dec0d0396f510d92d29dcc59eaef6b005282f14936838485f532192c57f0722949d7d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk315025.exe

    Filesize

    353KB

    MD5

    522c4ca06d3787fbb376fe56bc2b5931

    SHA1

    3fc1428257f6ec47716fe0ae22054f135aaa4d5f

    SHA256

    5c8b5b6abac933b35292d512ade991c92e01608025087a10fd2110f9153ebb25

    SHA512

    713ee4e6f291155b2b02f11131a6778e99dcbd11aa2603d9f333f4bdb07dec0d0396f510d92d29dcc59eaef6b005282f14936838485f532192c57f0722949d7d

  • memory/540-110-0x0000000000400000-0x0000000002B9E000-memory.dmp

    Filesize

    39.6MB

  • memory/540-91-0x0000000003280000-0x0000000003292000-memory.dmp

    Filesize

    72KB

  • memory/540-89-0x0000000003280000-0x0000000003292000-memory.dmp

    Filesize

    72KB

  • memory/540-93-0x0000000003280000-0x0000000003292000-memory.dmp

    Filesize

    72KB

  • memory/540-97-0x00000000070D0000-0x0000000007110000-memory.dmp

    Filesize

    256KB

  • memory/540-99-0x0000000003280000-0x0000000003292000-memory.dmp

    Filesize

    72KB

  • memory/540-96-0x0000000003280000-0x0000000003292000-memory.dmp

    Filesize

    72KB

  • memory/540-95-0x0000000000250000-0x000000000027D000-memory.dmp

    Filesize

    180KB

  • memory/540-101-0x0000000003280000-0x0000000003292000-memory.dmp

    Filesize

    72KB

  • memory/540-103-0x0000000003280000-0x0000000003292000-memory.dmp

    Filesize

    72KB

  • memory/540-105-0x0000000003280000-0x0000000003292000-memory.dmp

    Filesize

    72KB

  • memory/540-109-0x0000000003280000-0x0000000003292000-memory.dmp

    Filesize

    72KB

  • memory/540-107-0x0000000003280000-0x0000000003292000-memory.dmp

    Filesize

    72KB

  • memory/540-87-0x0000000003280000-0x0000000003292000-memory.dmp

    Filesize

    72KB

  • memory/540-111-0x0000000000400000-0x0000000002B9E000-memory.dmp

    Filesize

    39.6MB

  • memory/540-85-0x0000000003280000-0x0000000003292000-memory.dmp

    Filesize

    72KB

  • memory/540-81-0x0000000003280000-0x0000000003292000-memory.dmp

    Filesize

    72KB

  • memory/540-83-0x0000000003280000-0x0000000003292000-memory.dmp

    Filesize

    72KB

  • memory/540-80-0x0000000003280000-0x0000000003292000-memory.dmp

    Filesize

    72KB

  • memory/540-79-0x0000000003280000-0x0000000003298000-memory.dmp

    Filesize

    96KB

  • memory/540-78-0x00000000003E0000-0x00000000003FA000-memory.dmp

    Filesize

    104KB

  • memory/1004-124-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1004-145-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1004-122-0x0000000004640000-0x000000000467C000-memory.dmp

    Filesize

    240KB

  • memory/1004-125-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1004-127-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1004-129-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1004-131-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1004-133-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1004-135-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1004-137-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1004-141-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1004-139-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1004-143-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1004-123-0x00000000047F0000-0x000000000482A000-memory.dmp

    Filesize

    232KB

  • memory/1004-147-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1004-149-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1004-151-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1004-153-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1004-155-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1004-157-0x00000000047F0000-0x0000000004825000-memory.dmp

    Filesize

    212KB

  • memory/1004-431-0x0000000002F10000-0x0000000002F56000-memory.dmp

    Filesize

    280KB

  • memory/1004-435-0x0000000007210000-0x0000000007250000-memory.dmp

    Filesize

    256KB

  • memory/1004-433-0x0000000007210000-0x0000000007250000-memory.dmp

    Filesize

    256KB

  • memory/1004-919-0x0000000007210000-0x0000000007250000-memory.dmp

    Filesize

    256KB

  • memory/1004-921-0x0000000007210000-0x0000000007250000-memory.dmp

    Filesize

    256KB

  • memory/1004-923-0x0000000007210000-0x0000000007250000-memory.dmp

    Filesize

    256KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.