Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 22:14
Static task
static1
Behavioral task
behavioral1
Sample
636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099.exe
Resource
win10v2004-20230220-en
General
-
Target
636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099.exe
-
Size
673KB
-
MD5
cbc430d7533eab35d40b4e11ebca0304
-
SHA1
e4c7c47d0c66ef140adeb942138aeb81a8a6fc6a
-
SHA256
636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099
-
SHA512
1fd90c143d7ce12e9a97e21cfa87a7cb7bf12e89758d905bc66707c418e57758c8eb072b65be1e0a242fc36b901f6c96618d192969d422f6ea9d24f092657f4d
-
SSDEEP
12288:Ny90g92W4igxjLtJ29onJ4nZWuZkjmuR61axn/PWpXa4M:NyV25ntJKonaZLZyZUDan
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 37638471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 37638471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 37638471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 37638471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 37638471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 37638471.exe -
Executes dropped EXE 3 IoCs
pid Process 1224 st236034.exe 1844 37638471.exe 1644 kp282789.exe -
Loads dropped DLL 7 IoCs
pid Process 1660 636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099.exe 1224 st236034.exe 1224 st236034.exe 1844 37638471.exe 1224 st236034.exe 1224 st236034.exe 1644 kp282789.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 37638471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 37638471.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce st236034.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st236034.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1844 37638471.exe 1844 37638471.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1844 37638471.exe Token: SeDebugPrivilege 1644 kp282789.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1224 1660 636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099.exe 27 PID 1660 wrote to memory of 1224 1660 636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099.exe 27 PID 1660 wrote to memory of 1224 1660 636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099.exe 27 PID 1660 wrote to memory of 1224 1660 636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099.exe 27 PID 1660 wrote to memory of 1224 1660 636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099.exe 27 PID 1660 wrote to memory of 1224 1660 636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099.exe 27 PID 1660 wrote to memory of 1224 1660 636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099.exe 27 PID 1224 wrote to memory of 1844 1224 st236034.exe 28 PID 1224 wrote to memory of 1844 1224 st236034.exe 28 PID 1224 wrote to memory of 1844 1224 st236034.exe 28 PID 1224 wrote to memory of 1844 1224 st236034.exe 28 PID 1224 wrote to memory of 1844 1224 st236034.exe 28 PID 1224 wrote to memory of 1844 1224 st236034.exe 28 PID 1224 wrote to memory of 1844 1224 st236034.exe 28 PID 1224 wrote to memory of 1644 1224 st236034.exe 29 PID 1224 wrote to memory of 1644 1224 st236034.exe 29 PID 1224 wrote to memory of 1644 1224 st236034.exe 29 PID 1224 wrote to memory of 1644 1224 st236034.exe 29 PID 1224 wrote to memory of 1644 1224 st236034.exe 29 PID 1224 wrote to memory of 1644 1224 st236034.exe 29 PID 1224 wrote to memory of 1644 1224 st236034.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099.exe"C:\Users\Admin\AppData\Local\Temp\636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st236034.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st236034.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\37638471.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\37638471.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1844
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp282789.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp282789.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD5c319e8a010ac18b2f3baf0dd991d4ae0
SHA1ce891af164cee8ab6b9bb5e002cefd00685e73e0
SHA256b27e782988e4b72fc3e99ae11b68bc421acd299e6929d66fe475b7460633dbbd
SHA512b0248ec03f92bbc17eef61b11b9fd57b3944cf726aa4d8d11cb8156cb14526928116af01c17d983194a72c91fe37b15177334e17dfea5c71e41ab98d93a0f499
-
Filesize
520KB
MD5c319e8a010ac18b2f3baf0dd991d4ae0
SHA1ce891af164cee8ab6b9bb5e002cefd00685e73e0
SHA256b27e782988e4b72fc3e99ae11b68bc421acd299e6929d66fe475b7460633dbbd
SHA512b0248ec03f92bbc17eef61b11b9fd57b3944cf726aa4d8d11cb8156cb14526928116af01c17d983194a72c91fe37b15177334e17dfea5c71e41ab98d93a0f499
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
415KB
MD5ad869f737d67effd614cf4480a604a03
SHA19ed6b9e116c52c53ba92ae573f0ab7341f6ba143
SHA25683250be62ca36b912106a0fd469f9444b556a14acb6311e0bfddc732bd31cb01
SHA512b7c0edb037670d01592c6aa457dcdc0b88f296b5653a8267074b430f1bbe342879625f5cbb1bff342f4726c803eba5144b04e3091f87fb8013e38d086753e073
-
Filesize
415KB
MD5ad869f737d67effd614cf4480a604a03
SHA19ed6b9e116c52c53ba92ae573f0ab7341f6ba143
SHA25683250be62ca36b912106a0fd469f9444b556a14acb6311e0bfddc732bd31cb01
SHA512b7c0edb037670d01592c6aa457dcdc0b88f296b5653a8267074b430f1bbe342879625f5cbb1bff342f4726c803eba5144b04e3091f87fb8013e38d086753e073
-
Filesize
415KB
MD5ad869f737d67effd614cf4480a604a03
SHA19ed6b9e116c52c53ba92ae573f0ab7341f6ba143
SHA25683250be62ca36b912106a0fd469f9444b556a14acb6311e0bfddc732bd31cb01
SHA512b7c0edb037670d01592c6aa457dcdc0b88f296b5653a8267074b430f1bbe342879625f5cbb1bff342f4726c803eba5144b04e3091f87fb8013e38d086753e073
-
Filesize
520KB
MD5c319e8a010ac18b2f3baf0dd991d4ae0
SHA1ce891af164cee8ab6b9bb5e002cefd00685e73e0
SHA256b27e782988e4b72fc3e99ae11b68bc421acd299e6929d66fe475b7460633dbbd
SHA512b0248ec03f92bbc17eef61b11b9fd57b3944cf726aa4d8d11cb8156cb14526928116af01c17d983194a72c91fe37b15177334e17dfea5c71e41ab98d93a0f499
-
Filesize
520KB
MD5c319e8a010ac18b2f3baf0dd991d4ae0
SHA1ce891af164cee8ab6b9bb5e002cefd00685e73e0
SHA256b27e782988e4b72fc3e99ae11b68bc421acd299e6929d66fe475b7460633dbbd
SHA512b0248ec03f92bbc17eef61b11b9fd57b3944cf726aa4d8d11cb8156cb14526928116af01c17d983194a72c91fe37b15177334e17dfea5c71e41ab98d93a0f499
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
415KB
MD5ad869f737d67effd614cf4480a604a03
SHA19ed6b9e116c52c53ba92ae573f0ab7341f6ba143
SHA25683250be62ca36b912106a0fd469f9444b556a14acb6311e0bfddc732bd31cb01
SHA512b7c0edb037670d01592c6aa457dcdc0b88f296b5653a8267074b430f1bbe342879625f5cbb1bff342f4726c803eba5144b04e3091f87fb8013e38d086753e073
-
Filesize
415KB
MD5ad869f737d67effd614cf4480a604a03
SHA19ed6b9e116c52c53ba92ae573f0ab7341f6ba143
SHA25683250be62ca36b912106a0fd469f9444b556a14acb6311e0bfddc732bd31cb01
SHA512b7c0edb037670d01592c6aa457dcdc0b88f296b5653a8267074b430f1bbe342879625f5cbb1bff342f4726c803eba5144b04e3091f87fb8013e38d086753e073
-
Filesize
415KB
MD5ad869f737d67effd614cf4480a604a03
SHA19ed6b9e116c52c53ba92ae573f0ab7341f6ba143
SHA25683250be62ca36b912106a0fd469f9444b556a14acb6311e0bfddc732bd31cb01
SHA512b7c0edb037670d01592c6aa457dcdc0b88f296b5653a8267074b430f1bbe342879625f5cbb1bff342f4726c803eba5144b04e3091f87fb8013e38d086753e073