Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
272s -
max time network
355s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 22:06
Static task
static1
Behavioral task
behavioral1
Sample
5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe
Resource
win10v2004-20230220-en
General
-
Target
5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe
-
Size
480KB
-
MD5
c22ecf7be4172b40ba0f12d3b88f3a77
-
SHA1
c0aa96d17ff1e8a6169a98e45c91414561d2d72c
-
SHA256
5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3
-
SHA512
2edcc61f51188a4a998bc472b6fe40049e8412d2f767fcab953f4c61a41700f4ada723ad88d88667a200f947660a7bf8b324e2a3b0c739d21e7c2a04e708af14
-
SSDEEP
12288:kMrWy90a4K3p1NKtuwa5suOqk8F3rXhyXP/:yy30tF63rhQ/
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k7428967.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k7428967.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k7428967.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k7428967.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k7428967.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k7428967.exe -
Executes dropped EXE 3 IoCs
pid Process 560 y7874431.exe 336 k7428967.exe 588 l2688427.exe -
Loads dropped DLL 6 IoCs
pid Process 856 5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe 560 y7874431.exe 560 y7874431.exe 336 k7428967.exe 560 y7874431.exe 588 l2688427.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features k7428967.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k7428967.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y7874431.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y7874431.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 336 k7428967.exe 336 k7428967.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 336 k7428967.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 856 wrote to memory of 560 856 5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe 28 PID 856 wrote to memory of 560 856 5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe 28 PID 856 wrote to memory of 560 856 5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe 28 PID 856 wrote to memory of 560 856 5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe 28 PID 856 wrote to memory of 560 856 5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe 28 PID 856 wrote to memory of 560 856 5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe 28 PID 856 wrote to memory of 560 856 5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe 28 PID 560 wrote to memory of 336 560 y7874431.exe 29 PID 560 wrote to memory of 336 560 y7874431.exe 29 PID 560 wrote to memory of 336 560 y7874431.exe 29 PID 560 wrote to memory of 336 560 y7874431.exe 29 PID 560 wrote to memory of 336 560 y7874431.exe 29 PID 560 wrote to memory of 336 560 y7874431.exe 29 PID 560 wrote to memory of 336 560 y7874431.exe 29 PID 560 wrote to memory of 588 560 y7874431.exe 30 PID 560 wrote to memory of 588 560 y7874431.exe 30 PID 560 wrote to memory of 588 560 y7874431.exe 30 PID 560 wrote to memory of 588 560 y7874431.exe 30 PID 560 wrote to memory of 588 560 y7874431.exe 30 PID 560 wrote to memory of 588 560 y7874431.exe 30 PID 560 wrote to memory of 588 560 y7874431.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe"C:\Users\Admin\AppData\Local\Temp\5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7874431.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7874431.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7428967.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7428967.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:336
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2688427.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2688427.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:588
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD54bd71a90a4aa125a8590163447d94c3f
SHA167318fed9bdfa16bdc5479059c1f88528cf64138
SHA25680510d6679fbf1690ce783f9c6c0d0fc501a28bb041290b84bef0c11f1928887
SHA512107d37a3c94470c7694b46ca8712f7ab0aaefb68f516adc305c165a45a13cc8934071f4dadfd2ea7c3ac50a8f89904780315937a8b1c99e72a843422933f2c4e
-
Filesize
308KB
MD54bd71a90a4aa125a8590163447d94c3f
SHA167318fed9bdfa16bdc5479059c1f88528cf64138
SHA25680510d6679fbf1690ce783f9c6c0d0fc501a28bb041290b84bef0c11f1928887
SHA512107d37a3c94470c7694b46ca8712f7ab0aaefb68f516adc305c165a45a13cc8934071f4dadfd2ea7c3ac50a8f89904780315937a8b1c99e72a843422933f2c4e
-
Filesize
175KB
MD56efa797eb50dac8657ff6d73429238c0
SHA1c90fb0c95ab592d374a87509f25849ede9c76b0e
SHA2560e62738c1d9c012ac4442b31491d45780fb8e0e968b43d96624a278e9a2585b8
SHA512d01d7673e72e4e5f56041fd3d20dd72d2261298118cc20981da4d2a81fbc446af014809c022ec21d422648065a0b603a71a4e5fe2d9a14192edb5422ee192dbd
-
Filesize
175KB
MD56efa797eb50dac8657ff6d73429238c0
SHA1c90fb0c95ab592d374a87509f25849ede9c76b0e
SHA2560e62738c1d9c012ac4442b31491d45780fb8e0e968b43d96624a278e9a2585b8
SHA512d01d7673e72e4e5f56041fd3d20dd72d2261298118cc20981da4d2a81fbc446af014809c022ec21d422648065a0b603a71a4e5fe2d9a14192edb5422ee192dbd
-
Filesize
136KB
MD5a9cffe55332618677bd3a47a2074e1d5
SHA197a87c851200aa3b4affb8f9e5fb249f95fe430b
SHA2568bbbb84343c512e9f36b18f4ffe3ed6e53a5668c64958f1bcbb20c0a9b2bce93
SHA5124f6f4c13ac0721fafbc1957262dd996608beab786e270c7f5f5b51b918ccd3b9925052d9d5225f5795b2a98e516597491547ccc3ef0c6d625371b96809949e5f
-
Filesize
136KB
MD5a9cffe55332618677bd3a47a2074e1d5
SHA197a87c851200aa3b4affb8f9e5fb249f95fe430b
SHA2568bbbb84343c512e9f36b18f4ffe3ed6e53a5668c64958f1bcbb20c0a9b2bce93
SHA5124f6f4c13ac0721fafbc1957262dd996608beab786e270c7f5f5b51b918ccd3b9925052d9d5225f5795b2a98e516597491547ccc3ef0c6d625371b96809949e5f
-
Filesize
308KB
MD54bd71a90a4aa125a8590163447d94c3f
SHA167318fed9bdfa16bdc5479059c1f88528cf64138
SHA25680510d6679fbf1690ce783f9c6c0d0fc501a28bb041290b84bef0c11f1928887
SHA512107d37a3c94470c7694b46ca8712f7ab0aaefb68f516adc305c165a45a13cc8934071f4dadfd2ea7c3ac50a8f89904780315937a8b1c99e72a843422933f2c4e
-
Filesize
308KB
MD54bd71a90a4aa125a8590163447d94c3f
SHA167318fed9bdfa16bdc5479059c1f88528cf64138
SHA25680510d6679fbf1690ce783f9c6c0d0fc501a28bb041290b84bef0c11f1928887
SHA512107d37a3c94470c7694b46ca8712f7ab0aaefb68f516adc305c165a45a13cc8934071f4dadfd2ea7c3ac50a8f89904780315937a8b1c99e72a843422933f2c4e
-
Filesize
175KB
MD56efa797eb50dac8657ff6d73429238c0
SHA1c90fb0c95ab592d374a87509f25849ede9c76b0e
SHA2560e62738c1d9c012ac4442b31491d45780fb8e0e968b43d96624a278e9a2585b8
SHA512d01d7673e72e4e5f56041fd3d20dd72d2261298118cc20981da4d2a81fbc446af014809c022ec21d422648065a0b603a71a4e5fe2d9a14192edb5422ee192dbd
-
Filesize
175KB
MD56efa797eb50dac8657ff6d73429238c0
SHA1c90fb0c95ab592d374a87509f25849ede9c76b0e
SHA2560e62738c1d9c012ac4442b31491d45780fb8e0e968b43d96624a278e9a2585b8
SHA512d01d7673e72e4e5f56041fd3d20dd72d2261298118cc20981da4d2a81fbc446af014809c022ec21d422648065a0b603a71a4e5fe2d9a14192edb5422ee192dbd
-
Filesize
136KB
MD5a9cffe55332618677bd3a47a2074e1d5
SHA197a87c851200aa3b4affb8f9e5fb249f95fe430b
SHA2568bbbb84343c512e9f36b18f4ffe3ed6e53a5668c64958f1bcbb20c0a9b2bce93
SHA5124f6f4c13ac0721fafbc1957262dd996608beab786e270c7f5f5b51b918ccd3b9925052d9d5225f5795b2a98e516597491547ccc3ef0c6d625371b96809949e5f
-
Filesize
136KB
MD5a9cffe55332618677bd3a47a2074e1d5
SHA197a87c851200aa3b4affb8f9e5fb249f95fe430b
SHA2568bbbb84343c512e9f36b18f4ffe3ed6e53a5668c64958f1bcbb20c0a9b2bce93
SHA5124f6f4c13ac0721fafbc1957262dd996608beab786e270c7f5f5b51b918ccd3b9925052d9d5225f5795b2a98e516597491547ccc3ef0c6d625371b96809949e5f