Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe
Resource
win10v2004-20230220-en
General
-
Target
60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe
-
Size
691KB
-
MD5
7c3275409a3c421c4c64c84557d0369e
-
SHA1
040731069fd061021fd8b3a0cb0531eed1824492
-
SHA256
60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39
-
SHA512
0e12ae1e1c7c8a3bd040ab215d6a4129898b8a356981a68e808bed17ad101c821bba6fcc5a1295d2b89a2fde2282542b633f062ea309b578268d24a47da0ab80
-
SSDEEP
12288:Dy90PWUJi5+BLKRv4AdCYcmrIlzyesue2Q7wVgANBZSSr4b5PKq:DyQWZyk4XtJyxt2iANeSkb5Pd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 16087329.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 16087329.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 16087329.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 16087329.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 16087329.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 16087329.exe -
Executes dropped EXE 5 IoCs
pid Process 1960 un851024.exe 572 16087329.exe 840 rk984009.exe 1408 rk984009.exe 1808 si636532.exe -
Loads dropped DLL 12 IoCs
pid Process 2004 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe 1960 un851024.exe 1960 un851024.exe 1960 un851024.exe 572 16087329.exe 1960 un851024.exe 1960 un851024.exe 840 rk984009.exe 840 rk984009.exe 1408 rk984009.exe 2004 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe 1808 si636532.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 16087329.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 16087329.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un851024.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un851024.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 840 set thread context of 1408 840 rk984009.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 572 16087329.exe 572 16087329.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 572 16087329.exe Token: SeDebugPrivilege 1408 rk984009.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1960 2004 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe 28 PID 2004 wrote to memory of 1960 2004 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe 28 PID 2004 wrote to memory of 1960 2004 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe 28 PID 2004 wrote to memory of 1960 2004 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe 28 PID 2004 wrote to memory of 1960 2004 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe 28 PID 2004 wrote to memory of 1960 2004 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe 28 PID 2004 wrote to memory of 1960 2004 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe 28 PID 1960 wrote to memory of 572 1960 un851024.exe 29 PID 1960 wrote to memory of 572 1960 un851024.exe 29 PID 1960 wrote to memory of 572 1960 un851024.exe 29 PID 1960 wrote to memory of 572 1960 un851024.exe 29 PID 1960 wrote to memory of 572 1960 un851024.exe 29 PID 1960 wrote to memory of 572 1960 un851024.exe 29 PID 1960 wrote to memory of 572 1960 un851024.exe 29 PID 1960 wrote to memory of 840 1960 un851024.exe 30 PID 1960 wrote to memory of 840 1960 un851024.exe 30 PID 1960 wrote to memory of 840 1960 un851024.exe 30 PID 1960 wrote to memory of 840 1960 un851024.exe 30 PID 1960 wrote to memory of 840 1960 un851024.exe 30 PID 1960 wrote to memory of 840 1960 un851024.exe 30 PID 1960 wrote to memory of 840 1960 un851024.exe 30 PID 840 wrote to memory of 1408 840 rk984009.exe 31 PID 840 wrote to memory of 1408 840 rk984009.exe 31 PID 840 wrote to memory of 1408 840 rk984009.exe 31 PID 840 wrote to memory of 1408 840 rk984009.exe 31 PID 840 wrote to memory of 1408 840 rk984009.exe 31 PID 840 wrote to memory of 1408 840 rk984009.exe 31 PID 840 wrote to memory of 1408 840 rk984009.exe 31 PID 840 wrote to memory of 1408 840 rk984009.exe 31 PID 840 wrote to memory of 1408 840 rk984009.exe 31 PID 840 wrote to memory of 1408 840 rk984009.exe 31 PID 840 wrote to memory of 1408 840 rk984009.exe 31 PID 840 wrote to memory of 1408 840 rk984009.exe 31 PID 840 wrote to memory of 1408 840 rk984009.exe 31 PID 2004 wrote to memory of 1808 2004 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe 32 PID 2004 wrote to memory of 1808 2004 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe 32 PID 2004 wrote to memory of 1808 2004 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe 32 PID 2004 wrote to memory of 1808 2004 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe 32 PID 2004 wrote to memory of 1808 2004 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe 32 PID 2004 wrote to memory of 1808 2004 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe 32 PID 2004 wrote to memory of 1808 2004 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe"C:\Users\Admin\AppData\Local\Temp\60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un851024.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un851024.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\16087329.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\16087329.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:572
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk984009.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk984009.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk984009.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk984009.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si636532.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si636532.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1808
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5e1c805d3cefe221689da30b8a2d944f2
SHA1a9a94fd89ed22c2a127c81f6e57f822eae1d9f26
SHA25632023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a
SHA5127801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7
-
Filesize
136KB
MD5e1c805d3cefe221689da30b8a2d944f2
SHA1a9a94fd89ed22c2a127c81f6e57f822eae1d9f26
SHA25632023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a
SHA5127801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7
-
Filesize
537KB
MD5923dd840d11ad83a7b8a0aa0ec580bd9
SHA1998c072ba8715c67129b0d4c2e47402b316778ab
SHA2562ee4de028dbab8107c78417ed2820c7938a19b036a4ac19ffe323b4bf121f8f2
SHA512487e6e25cc437077e42f3c138f216d5956e8d26152d03bda268f6afe606be64585dd39f45dbbd117ad3a6aeb027466a77b1203b9d2291a5c8c3e1e99c6f62a15
-
Filesize
537KB
MD5923dd840d11ad83a7b8a0aa0ec580bd9
SHA1998c072ba8715c67129b0d4c2e47402b316778ab
SHA2562ee4de028dbab8107c78417ed2820c7938a19b036a4ac19ffe323b4bf121f8f2
SHA512487e6e25cc437077e42f3c138f216d5956e8d26152d03bda268f6afe606be64585dd39f45dbbd117ad3a6aeb027466a77b1203b9d2291a5c8c3e1e99c6f62a15
-
Filesize
259KB
MD5e316c2de777d55b98eb76fa4b278de7f
SHA111cac13b2850abeef8d1d359f24fb7865173f6dd
SHA256bc3e53579b9cde6683fa8d45c6e62e53c6c337e9f0f44ff7808ab58474060c17
SHA512ef9c8ea766877b8ae7413d17d565a6a43af6f641fe8e344a0036cd8eb0ac060a3a98c7ce7aa21ffdd7242b4b44d187ab64e966d7af4e50db58bc64d21d6e4104
-
Filesize
259KB
MD5e316c2de777d55b98eb76fa4b278de7f
SHA111cac13b2850abeef8d1d359f24fb7865173f6dd
SHA256bc3e53579b9cde6683fa8d45c6e62e53c6c337e9f0f44ff7808ab58474060c17
SHA512ef9c8ea766877b8ae7413d17d565a6a43af6f641fe8e344a0036cd8eb0ac060a3a98c7ce7aa21ffdd7242b4b44d187ab64e966d7af4e50db58bc64d21d6e4104
-
Filesize
259KB
MD5e316c2de777d55b98eb76fa4b278de7f
SHA111cac13b2850abeef8d1d359f24fb7865173f6dd
SHA256bc3e53579b9cde6683fa8d45c6e62e53c6c337e9f0f44ff7808ab58474060c17
SHA512ef9c8ea766877b8ae7413d17d565a6a43af6f641fe8e344a0036cd8eb0ac060a3a98c7ce7aa21ffdd7242b4b44d187ab64e966d7af4e50db58bc64d21d6e4104
-
Filesize
342KB
MD5bf70b37bcbd0f719e03a982c6c588d77
SHA132a932047845ebe2a8a2b22d48dc2af192a18d91
SHA25617ed923cb1e879ec89be82253dbfda9a6d14d4f1272706bd340f589df2874279
SHA51227e03eabf35e3c507fb943b4953e1919c386ef986683d81e650a0dda5185907eb032e1acb3fa493f8e768b36439ddf61e2cfea76979d001c4986a609f588e0bd
-
Filesize
342KB
MD5bf70b37bcbd0f719e03a982c6c588d77
SHA132a932047845ebe2a8a2b22d48dc2af192a18d91
SHA25617ed923cb1e879ec89be82253dbfda9a6d14d4f1272706bd340f589df2874279
SHA51227e03eabf35e3c507fb943b4953e1919c386ef986683d81e650a0dda5185907eb032e1acb3fa493f8e768b36439ddf61e2cfea76979d001c4986a609f588e0bd
-
Filesize
342KB
MD5bf70b37bcbd0f719e03a982c6c588d77
SHA132a932047845ebe2a8a2b22d48dc2af192a18d91
SHA25617ed923cb1e879ec89be82253dbfda9a6d14d4f1272706bd340f589df2874279
SHA51227e03eabf35e3c507fb943b4953e1919c386ef986683d81e650a0dda5185907eb032e1acb3fa493f8e768b36439ddf61e2cfea76979d001c4986a609f588e0bd
-
Filesize
342KB
MD5bf70b37bcbd0f719e03a982c6c588d77
SHA132a932047845ebe2a8a2b22d48dc2af192a18d91
SHA25617ed923cb1e879ec89be82253dbfda9a6d14d4f1272706bd340f589df2874279
SHA51227e03eabf35e3c507fb943b4953e1919c386ef986683d81e650a0dda5185907eb032e1acb3fa493f8e768b36439ddf61e2cfea76979d001c4986a609f588e0bd
-
Filesize
136KB
MD5e1c805d3cefe221689da30b8a2d944f2
SHA1a9a94fd89ed22c2a127c81f6e57f822eae1d9f26
SHA25632023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a
SHA5127801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7
-
Filesize
136KB
MD5e1c805d3cefe221689da30b8a2d944f2
SHA1a9a94fd89ed22c2a127c81f6e57f822eae1d9f26
SHA25632023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a
SHA5127801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7
-
Filesize
537KB
MD5923dd840d11ad83a7b8a0aa0ec580bd9
SHA1998c072ba8715c67129b0d4c2e47402b316778ab
SHA2562ee4de028dbab8107c78417ed2820c7938a19b036a4ac19ffe323b4bf121f8f2
SHA512487e6e25cc437077e42f3c138f216d5956e8d26152d03bda268f6afe606be64585dd39f45dbbd117ad3a6aeb027466a77b1203b9d2291a5c8c3e1e99c6f62a15
-
Filesize
537KB
MD5923dd840d11ad83a7b8a0aa0ec580bd9
SHA1998c072ba8715c67129b0d4c2e47402b316778ab
SHA2562ee4de028dbab8107c78417ed2820c7938a19b036a4ac19ffe323b4bf121f8f2
SHA512487e6e25cc437077e42f3c138f216d5956e8d26152d03bda268f6afe606be64585dd39f45dbbd117ad3a6aeb027466a77b1203b9d2291a5c8c3e1e99c6f62a15
-
Filesize
259KB
MD5e316c2de777d55b98eb76fa4b278de7f
SHA111cac13b2850abeef8d1d359f24fb7865173f6dd
SHA256bc3e53579b9cde6683fa8d45c6e62e53c6c337e9f0f44ff7808ab58474060c17
SHA512ef9c8ea766877b8ae7413d17d565a6a43af6f641fe8e344a0036cd8eb0ac060a3a98c7ce7aa21ffdd7242b4b44d187ab64e966d7af4e50db58bc64d21d6e4104
-
Filesize
259KB
MD5e316c2de777d55b98eb76fa4b278de7f
SHA111cac13b2850abeef8d1d359f24fb7865173f6dd
SHA256bc3e53579b9cde6683fa8d45c6e62e53c6c337e9f0f44ff7808ab58474060c17
SHA512ef9c8ea766877b8ae7413d17d565a6a43af6f641fe8e344a0036cd8eb0ac060a3a98c7ce7aa21ffdd7242b4b44d187ab64e966d7af4e50db58bc64d21d6e4104
-
Filesize
259KB
MD5e316c2de777d55b98eb76fa4b278de7f
SHA111cac13b2850abeef8d1d359f24fb7865173f6dd
SHA256bc3e53579b9cde6683fa8d45c6e62e53c6c337e9f0f44ff7808ab58474060c17
SHA512ef9c8ea766877b8ae7413d17d565a6a43af6f641fe8e344a0036cd8eb0ac060a3a98c7ce7aa21ffdd7242b4b44d187ab64e966d7af4e50db58bc64d21d6e4104
-
Filesize
342KB
MD5bf70b37bcbd0f719e03a982c6c588d77
SHA132a932047845ebe2a8a2b22d48dc2af192a18d91
SHA25617ed923cb1e879ec89be82253dbfda9a6d14d4f1272706bd340f589df2874279
SHA51227e03eabf35e3c507fb943b4953e1919c386ef986683d81e650a0dda5185907eb032e1acb3fa493f8e768b36439ddf61e2cfea76979d001c4986a609f588e0bd
-
Filesize
342KB
MD5bf70b37bcbd0f719e03a982c6c588d77
SHA132a932047845ebe2a8a2b22d48dc2af192a18d91
SHA25617ed923cb1e879ec89be82253dbfda9a6d14d4f1272706bd340f589df2874279
SHA51227e03eabf35e3c507fb943b4953e1919c386ef986683d81e650a0dda5185907eb032e1acb3fa493f8e768b36439ddf61e2cfea76979d001c4986a609f588e0bd
-
Filesize
342KB
MD5bf70b37bcbd0f719e03a982c6c588d77
SHA132a932047845ebe2a8a2b22d48dc2af192a18d91
SHA25617ed923cb1e879ec89be82253dbfda9a6d14d4f1272706bd340f589df2874279
SHA51227e03eabf35e3c507fb943b4953e1919c386ef986683d81e650a0dda5185907eb032e1acb3fa493f8e768b36439ddf61e2cfea76979d001c4986a609f588e0bd
-
Filesize
342KB
MD5bf70b37bcbd0f719e03a982c6c588d77
SHA132a932047845ebe2a8a2b22d48dc2af192a18d91
SHA25617ed923cb1e879ec89be82253dbfda9a6d14d4f1272706bd340f589df2874279
SHA51227e03eabf35e3c507fb943b4953e1919c386ef986683d81e650a0dda5185907eb032e1acb3fa493f8e768b36439ddf61e2cfea76979d001c4986a609f588e0bd
-
Filesize
342KB
MD5bf70b37bcbd0f719e03a982c6c588d77
SHA132a932047845ebe2a8a2b22d48dc2af192a18d91
SHA25617ed923cb1e879ec89be82253dbfda9a6d14d4f1272706bd340f589df2874279
SHA51227e03eabf35e3c507fb943b4953e1919c386ef986683d81e650a0dda5185907eb032e1acb3fa493f8e768b36439ddf61e2cfea76979d001c4986a609f588e0bd