Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    272s
  • max time network
    355s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 22:06

General

  • Target

    5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe

  • Size

    480KB

  • MD5

    c22ecf7be4172b40ba0f12d3b88f3a77

  • SHA1

    c0aa96d17ff1e8a6169a98e45c91414561d2d72c

  • SHA256

    5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3

  • SHA512

    2edcc61f51188a4a998bc472b6fe40049e8412d2f767fcab953f4c61a41700f4ada723ad88d88667a200f947660a7bf8b324e2a3b0c739d21e7c2a04e708af14

  • SSDEEP

    12288:kMrWy90a4K3p1NKtuwa5suOqk8F3rXhyXP/:yy30tF63rhQ/

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe
    "C:\Users\Admin\AppData\Local\Temp\5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7874431.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7874431.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:560
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7428967.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7428967.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:336
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2688427.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2688427.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:588

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7874431.exe

    Filesize

    308KB

    MD5

    4bd71a90a4aa125a8590163447d94c3f

    SHA1

    67318fed9bdfa16bdc5479059c1f88528cf64138

    SHA256

    80510d6679fbf1690ce783f9c6c0d0fc501a28bb041290b84bef0c11f1928887

    SHA512

    107d37a3c94470c7694b46ca8712f7ab0aaefb68f516adc305c165a45a13cc8934071f4dadfd2ea7c3ac50a8f89904780315937a8b1c99e72a843422933f2c4e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7874431.exe

    Filesize

    308KB

    MD5

    4bd71a90a4aa125a8590163447d94c3f

    SHA1

    67318fed9bdfa16bdc5479059c1f88528cf64138

    SHA256

    80510d6679fbf1690ce783f9c6c0d0fc501a28bb041290b84bef0c11f1928887

    SHA512

    107d37a3c94470c7694b46ca8712f7ab0aaefb68f516adc305c165a45a13cc8934071f4dadfd2ea7c3ac50a8f89904780315937a8b1c99e72a843422933f2c4e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7428967.exe

    Filesize

    175KB

    MD5

    6efa797eb50dac8657ff6d73429238c0

    SHA1

    c90fb0c95ab592d374a87509f25849ede9c76b0e

    SHA256

    0e62738c1d9c012ac4442b31491d45780fb8e0e968b43d96624a278e9a2585b8

    SHA512

    d01d7673e72e4e5f56041fd3d20dd72d2261298118cc20981da4d2a81fbc446af014809c022ec21d422648065a0b603a71a4e5fe2d9a14192edb5422ee192dbd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7428967.exe

    Filesize

    175KB

    MD5

    6efa797eb50dac8657ff6d73429238c0

    SHA1

    c90fb0c95ab592d374a87509f25849ede9c76b0e

    SHA256

    0e62738c1d9c012ac4442b31491d45780fb8e0e968b43d96624a278e9a2585b8

    SHA512

    d01d7673e72e4e5f56041fd3d20dd72d2261298118cc20981da4d2a81fbc446af014809c022ec21d422648065a0b603a71a4e5fe2d9a14192edb5422ee192dbd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2688427.exe

    Filesize

    136KB

    MD5

    a9cffe55332618677bd3a47a2074e1d5

    SHA1

    97a87c851200aa3b4affb8f9e5fb249f95fe430b

    SHA256

    8bbbb84343c512e9f36b18f4ffe3ed6e53a5668c64958f1bcbb20c0a9b2bce93

    SHA512

    4f6f4c13ac0721fafbc1957262dd996608beab786e270c7f5f5b51b918ccd3b9925052d9d5225f5795b2a98e516597491547ccc3ef0c6d625371b96809949e5f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2688427.exe

    Filesize

    136KB

    MD5

    a9cffe55332618677bd3a47a2074e1d5

    SHA1

    97a87c851200aa3b4affb8f9e5fb249f95fe430b

    SHA256

    8bbbb84343c512e9f36b18f4ffe3ed6e53a5668c64958f1bcbb20c0a9b2bce93

    SHA512

    4f6f4c13ac0721fafbc1957262dd996608beab786e270c7f5f5b51b918ccd3b9925052d9d5225f5795b2a98e516597491547ccc3ef0c6d625371b96809949e5f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y7874431.exe

    Filesize

    308KB

    MD5

    4bd71a90a4aa125a8590163447d94c3f

    SHA1

    67318fed9bdfa16bdc5479059c1f88528cf64138

    SHA256

    80510d6679fbf1690ce783f9c6c0d0fc501a28bb041290b84bef0c11f1928887

    SHA512

    107d37a3c94470c7694b46ca8712f7ab0aaefb68f516adc305c165a45a13cc8934071f4dadfd2ea7c3ac50a8f89904780315937a8b1c99e72a843422933f2c4e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y7874431.exe

    Filesize

    308KB

    MD5

    4bd71a90a4aa125a8590163447d94c3f

    SHA1

    67318fed9bdfa16bdc5479059c1f88528cf64138

    SHA256

    80510d6679fbf1690ce783f9c6c0d0fc501a28bb041290b84bef0c11f1928887

    SHA512

    107d37a3c94470c7694b46ca8712f7ab0aaefb68f516adc305c165a45a13cc8934071f4dadfd2ea7c3ac50a8f89904780315937a8b1c99e72a843422933f2c4e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\k7428967.exe

    Filesize

    175KB

    MD5

    6efa797eb50dac8657ff6d73429238c0

    SHA1

    c90fb0c95ab592d374a87509f25849ede9c76b0e

    SHA256

    0e62738c1d9c012ac4442b31491d45780fb8e0e968b43d96624a278e9a2585b8

    SHA512

    d01d7673e72e4e5f56041fd3d20dd72d2261298118cc20981da4d2a81fbc446af014809c022ec21d422648065a0b603a71a4e5fe2d9a14192edb5422ee192dbd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\k7428967.exe

    Filesize

    175KB

    MD5

    6efa797eb50dac8657ff6d73429238c0

    SHA1

    c90fb0c95ab592d374a87509f25849ede9c76b0e

    SHA256

    0e62738c1d9c012ac4442b31491d45780fb8e0e968b43d96624a278e9a2585b8

    SHA512

    d01d7673e72e4e5f56041fd3d20dd72d2261298118cc20981da4d2a81fbc446af014809c022ec21d422648065a0b603a71a4e5fe2d9a14192edb5422ee192dbd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\l2688427.exe

    Filesize

    136KB

    MD5

    a9cffe55332618677bd3a47a2074e1d5

    SHA1

    97a87c851200aa3b4affb8f9e5fb249f95fe430b

    SHA256

    8bbbb84343c512e9f36b18f4ffe3ed6e53a5668c64958f1bcbb20c0a9b2bce93

    SHA512

    4f6f4c13ac0721fafbc1957262dd996608beab786e270c7f5f5b51b918ccd3b9925052d9d5225f5795b2a98e516597491547ccc3ef0c6d625371b96809949e5f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\l2688427.exe

    Filesize

    136KB

    MD5

    a9cffe55332618677bd3a47a2074e1d5

    SHA1

    97a87c851200aa3b4affb8f9e5fb249f95fe430b

    SHA256

    8bbbb84343c512e9f36b18f4ffe3ed6e53a5668c64958f1bcbb20c0a9b2bce93

    SHA512

    4f6f4c13ac0721fafbc1957262dd996608beab786e270c7f5f5b51b918ccd3b9925052d9d5225f5795b2a98e516597491547ccc3ef0c6d625371b96809949e5f

  • memory/336-91-0x0000000000610000-0x0000000000622000-memory.dmp

    Filesize

    72KB

  • memory/336-105-0x0000000004B40000-0x0000000004B80000-memory.dmp

    Filesize

    256KB

  • memory/336-83-0x0000000000610000-0x0000000000622000-memory.dmp

    Filesize

    72KB

  • memory/336-85-0x0000000000610000-0x0000000000622000-memory.dmp

    Filesize

    72KB

  • memory/336-87-0x0000000000610000-0x0000000000622000-memory.dmp

    Filesize

    72KB

  • memory/336-89-0x0000000000610000-0x0000000000622000-memory.dmp

    Filesize

    72KB

  • memory/336-79-0x0000000000610000-0x0000000000622000-memory.dmp

    Filesize

    72KB

  • memory/336-93-0x0000000000610000-0x0000000000622000-memory.dmp

    Filesize

    72KB

  • memory/336-95-0x0000000000610000-0x0000000000622000-memory.dmp

    Filesize

    72KB

  • memory/336-97-0x0000000000610000-0x0000000000622000-memory.dmp

    Filesize

    72KB

  • memory/336-103-0x0000000000610000-0x0000000000622000-memory.dmp

    Filesize

    72KB

  • memory/336-101-0x0000000000610000-0x0000000000622000-memory.dmp

    Filesize

    72KB

  • memory/336-99-0x0000000000610000-0x0000000000622000-memory.dmp

    Filesize

    72KB

  • memory/336-81-0x0000000000610000-0x0000000000622000-memory.dmp

    Filesize

    72KB

  • memory/336-104-0x0000000004B40000-0x0000000004B80000-memory.dmp

    Filesize

    256KB

  • memory/336-107-0x0000000004B40000-0x0000000004B80000-memory.dmp

    Filesize

    256KB

  • memory/336-106-0x0000000004B40000-0x0000000004B80000-memory.dmp

    Filesize

    256KB

  • memory/336-108-0x0000000004B40000-0x0000000004B80000-memory.dmp

    Filesize

    256KB

  • memory/336-77-0x0000000000610000-0x0000000000622000-memory.dmp

    Filesize

    72KB

  • memory/336-76-0x0000000000610000-0x0000000000622000-memory.dmp

    Filesize

    72KB

  • memory/336-75-0x0000000000610000-0x0000000000628000-memory.dmp

    Filesize

    96KB

  • memory/336-74-0x00000000003E0000-0x00000000003FA000-memory.dmp

    Filesize

    104KB

  • memory/588-115-0x0000000000ED0000-0x0000000000EF8000-memory.dmp

    Filesize

    160KB

  • memory/588-116-0x0000000007000000-0x0000000007040000-memory.dmp

    Filesize

    256KB

  • memory/588-117-0x0000000007000000-0x0000000007040000-memory.dmp

    Filesize

    256KB