Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69.exe
Resource
win10v2004-20230220-en
General
-
Target
3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69.exe
-
Size
1.1MB
-
MD5
ceed9926c5bf5710aee782849b97a673
-
SHA1
a8d1d01daa24a5f5cb8a2852766ccd60f7a4bd60
-
SHA256
3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69
-
SHA512
aa44a2586006ba3ced0a07168ccbf6d94b1cd9cb75a747f173d6e3806a12f7aef9522cee024e57b9b33dccb6f3313fd5dc106c21f44544a17951b08d9685d0a4
-
SSDEEP
24576:Sy3mYAinZqbzOZNBz5CG1xhNPgaprYlzov+Pi7dbl63Kq+ec:5ruOPBAG1xj4apclAzdbls
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 57164204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 57164204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 57164204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 57164204.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 57164204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 57164204.exe -
Executes dropped EXE 4 IoCs
pid Process 1112 za787097.exe 1992 za209146.exe 1344 57164204.exe 1888 w11QU73.exe -
Loads dropped DLL 10 IoCs
pid Process 1444 3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69.exe 1112 za787097.exe 1112 za787097.exe 1992 za209146.exe 1992 za209146.exe 1992 za209146.exe 1344 57164204.exe 1992 za209146.exe 1992 za209146.exe 1888 w11QU73.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 57164204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 57164204.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce za209146.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" za209146.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce za787097.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" za787097.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1344 57164204.exe 1344 57164204.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1344 57164204.exe Token: SeDebugPrivilege 1888 w11QU73.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1112 1444 3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69.exe 27 PID 1444 wrote to memory of 1112 1444 3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69.exe 27 PID 1444 wrote to memory of 1112 1444 3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69.exe 27 PID 1444 wrote to memory of 1112 1444 3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69.exe 27 PID 1444 wrote to memory of 1112 1444 3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69.exe 27 PID 1444 wrote to memory of 1112 1444 3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69.exe 27 PID 1444 wrote to memory of 1112 1444 3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69.exe 27 PID 1112 wrote to memory of 1992 1112 za787097.exe 28 PID 1112 wrote to memory of 1992 1112 za787097.exe 28 PID 1112 wrote to memory of 1992 1112 za787097.exe 28 PID 1112 wrote to memory of 1992 1112 za787097.exe 28 PID 1112 wrote to memory of 1992 1112 za787097.exe 28 PID 1112 wrote to memory of 1992 1112 za787097.exe 28 PID 1112 wrote to memory of 1992 1112 za787097.exe 28 PID 1992 wrote to memory of 1344 1992 za209146.exe 29 PID 1992 wrote to memory of 1344 1992 za209146.exe 29 PID 1992 wrote to memory of 1344 1992 za209146.exe 29 PID 1992 wrote to memory of 1344 1992 za209146.exe 29 PID 1992 wrote to memory of 1344 1992 za209146.exe 29 PID 1992 wrote to memory of 1344 1992 za209146.exe 29 PID 1992 wrote to memory of 1344 1992 za209146.exe 29 PID 1992 wrote to memory of 1888 1992 za209146.exe 30 PID 1992 wrote to memory of 1888 1992 za209146.exe 30 PID 1992 wrote to memory of 1888 1992 za209146.exe 30 PID 1992 wrote to memory of 1888 1992 za209146.exe 30 PID 1992 wrote to memory of 1888 1992 za209146.exe 30 PID 1992 wrote to memory of 1888 1992 za209146.exe 30 PID 1992 wrote to memory of 1888 1992 za209146.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69.exe"C:\Users\Admin\AppData\Local\Temp\3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za787097.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za787097.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za209146.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za209146.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\57164204.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\57164204.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w11QU73.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w11QU73.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
775KB
MD57bf1fa1fc25a717976a1d527a44d0073
SHA1a9c415a807dd9ff9a5a2aa49d22575b0d5f6f4ae
SHA25698f2fbae8209149262382c3c28be9d1a0577df40434b71dee24ace2223d4940d
SHA512e924d74b20cc205a3291a537776566c71d91f3dbe4d7f17025927ebb6cfc17f89223785267c792b33e4a3085f7468bcea69cea902f02fe8d076454ca21dde435
-
Filesize
775KB
MD57bf1fa1fc25a717976a1d527a44d0073
SHA1a9c415a807dd9ff9a5a2aa49d22575b0d5f6f4ae
SHA25698f2fbae8209149262382c3c28be9d1a0577df40434b71dee24ace2223d4940d
SHA512e924d74b20cc205a3291a537776566c71d91f3dbe4d7f17025927ebb6cfc17f89223785267c792b33e4a3085f7468bcea69cea902f02fe8d076454ca21dde435
-
Filesize
593KB
MD5158b6da2018cec07e393e84809d93e25
SHA144eba44c2a339363bde1d8156bf25c6be69ca61a
SHA256d9faba8a8e5d66f96c89d119c9c0733a8bc915171e78027268cf7f028cc5c4bc
SHA5123c146b045490beba66f0f1f2a232b267435f68117b6235713874260ccf65e1a2562f6a63f48fb7318c552acde7fe48ee4847b2938b97871f95d8cef401eacbff
-
Filesize
593KB
MD5158b6da2018cec07e393e84809d93e25
SHA144eba44c2a339363bde1d8156bf25c6be69ca61a
SHA256d9faba8a8e5d66f96c89d119c9c0733a8bc915171e78027268cf7f028cc5c4bc
SHA5123c146b045490beba66f0f1f2a232b267435f68117b6235713874260ccf65e1a2562f6a63f48fb7318c552acde7fe48ee4847b2938b97871f95d8cef401eacbff
-
Filesize
377KB
MD5b87944d4e4208098315a7961f3617e44
SHA15cfd58eb2016c645593f6fc5f027932bc097d049
SHA25602d4fa840e5225dc03c23188247faed6351ffc8b7abfa38b3ef84383ecd6c336
SHA512a84462642dcf91334c81dfb38a03f4bff751d4731d308fd9f2a3bc9a1f5b8c49f85760f316af328f15b3103e2f2c2d8f7e88be1347384559784f929ee771d5f1
-
Filesize
377KB
MD5b87944d4e4208098315a7961f3617e44
SHA15cfd58eb2016c645593f6fc5f027932bc097d049
SHA25602d4fa840e5225dc03c23188247faed6351ffc8b7abfa38b3ef84383ecd6c336
SHA512a84462642dcf91334c81dfb38a03f4bff751d4731d308fd9f2a3bc9a1f5b8c49f85760f316af328f15b3103e2f2c2d8f7e88be1347384559784f929ee771d5f1
-
Filesize
377KB
MD5b87944d4e4208098315a7961f3617e44
SHA15cfd58eb2016c645593f6fc5f027932bc097d049
SHA25602d4fa840e5225dc03c23188247faed6351ffc8b7abfa38b3ef84383ecd6c336
SHA512a84462642dcf91334c81dfb38a03f4bff751d4731d308fd9f2a3bc9a1f5b8c49f85760f316af328f15b3103e2f2c2d8f7e88be1347384559784f929ee771d5f1
-
Filesize
459KB
MD5c18ce635d6d9106610d11398b938e462
SHA1c5c1ee545a2145920711b10ddf89e93c9c833483
SHA2565ff013f7fdf8466b0601f38b95111b2fa9963ddac705a00cface3cbfa1d7f069
SHA51266ba9ed6bd3a2755e848debe785f19db1187ccd3c11a05c87ae0d875dcf01b79b2377f01b6421996a246516809e78cdaa4d919f39c67f719f70e80c2223d0a9d
-
Filesize
459KB
MD5c18ce635d6d9106610d11398b938e462
SHA1c5c1ee545a2145920711b10ddf89e93c9c833483
SHA2565ff013f7fdf8466b0601f38b95111b2fa9963ddac705a00cface3cbfa1d7f069
SHA51266ba9ed6bd3a2755e848debe785f19db1187ccd3c11a05c87ae0d875dcf01b79b2377f01b6421996a246516809e78cdaa4d919f39c67f719f70e80c2223d0a9d
-
Filesize
459KB
MD5c18ce635d6d9106610d11398b938e462
SHA1c5c1ee545a2145920711b10ddf89e93c9c833483
SHA2565ff013f7fdf8466b0601f38b95111b2fa9963ddac705a00cface3cbfa1d7f069
SHA51266ba9ed6bd3a2755e848debe785f19db1187ccd3c11a05c87ae0d875dcf01b79b2377f01b6421996a246516809e78cdaa4d919f39c67f719f70e80c2223d0a9d
-
Filesize
775KB
MD57bf1fa1fc25a717976a1d527a44d0073
SHA1a9c415a807dd9ff9a5a2aa49d22575b0d5f6f4ae
SHA25698f2fbae8209149262382c3c28be9d1a0577df40434b71dee24ace2223d4940d
SHA512e924d74b20cc205a3291a537776566c71d91f3dbe4d7f17025927ebb6cfc17f89223785267c792b33e4a3085f7468bcea69cea902f02fe8d076454ca21dde435
-
Filesize
775KB
MD57bf1fa1fc25a717976a1d527a44d0073
SHA1a9c415a807dd9ff9a5a2aa49d22575b0d5f6f4ae
SHA25698f2fbae8209149262382c3c28be9d1a0577df40434b71dee24ace2223d4940d
SHA512e924d74b20cc205a3291a537776566c71d91f3dbe4d7f17025927ebb6cfc17f89223785267c792b33e4a3085f7468bcea69cea902f02fe8d076454ca21dde435
-
Filesize
593KB
MD5158b6da2018cec07e393e84809d93e25
SHA144eba44c2a339363bde1d8156bf25c6be69ca61a
SHA256d9faba8a8e5d66f96c89d119c9c0733a8bc915171e78027268cf7f028cc5c4bc
SHA5123c146b045490beba66f0f1f2a232b267435f68117b6235713874260ccf65e1a2562f6a63f48fb7318c552acde7fe48ee4847b2938b97871f95d8cef401eacbff
-
Filesize
593KB
MD5158b6da2018cec07e393e84809d93e25
SHA144eba44c2a339363bde1d8156bf25c6be69ca61a
SHA256d9faba8a8e5d66f96c89d119c9c0733a8bc915171e78027268cf7f028cc5c4bc
SHA5123c146b045490beba66f0f1f2a232b267435f68117b6235713874260ccf65e1a2562f6a63f48fb7318c552acde7fe48ee4847b2938b97871f95d8cef401eacbff
-
Filesize
377KB
MD5b87944d4e4208098315a7961f3617e44
SHA15cfd58eb2016c645593f6fc5f027932bc097d049
SHA25602d4fa840e5225dc03c23188247faed6351ffc8b7abfa38b3ef84383ecd6c336
SHA512a84462642dcf91334c81dfb38a03f4bff751d4731d308fd9f2a3bc9a1f5b8c49f85760f316af328f15b3103e2f2c2d8f7e88be1347384559784f929ee771d5f1
-
Filesize
377KB
MD5b87944d4e4208098315a7961f3617e44
SHA15cfd58eb2016c645593f6fc5f027932bc097d049
SHA25602d4fa840e5225dc03c23188247faed6351ffc8b7abfa38b3ef84383ecd6c336
SHA512a84462642dcf91334c81dfb38a03f4bff751d4731d308fd9f2a3bc9a1f5b8c49f85760f316af328f15b3103e2f2c2d8f7e88be1347384559784f929ee771d5f1
-
Filesize
377KB
MD5b87944d4e4208098315a7961f3617e44
SHA15cfd58eb2016c645593f6fc5f027932bc097d049
SHA25602d4fa840e5225dc03c23188247faed6351ffc8b7abfa38b3ef84383ecd6c336
SHA512a84462642dcf91334c81dfb38a03f4bff751d4731d308fd9f2a3bc9a1f5b8c49f85760f316af328f15b3103e2f2c2d8f7e88be1347384559784f929ee771d5f1
-
Filesize
459KB
MD5c18ce635d6d9106610d11398b938e462
SHA1c5c1ee545a2145920711b10ddf89e93c9c833483
SHA2565ff013f7fdf8466b0601f38b95111b2fa9963ddac705a00cface3cbfa1d7f069
SHA51266ba9ed6bd3a2755e848debe785f19db1187ccd3c11a05c87ae0d875dcf01b79b2377f01b6421996a246516809e78cdaa4d919f39c67f719f70e80c2223d0a9d
-
Filesize
459KB
MD5c18ce635d6d9106610d11398b938e462
SHA1c5c1ee545a2145920711b10ddf89e93c9c833483
SHA2565ff013f7fdf8466b0601f38b95111b2fa9963ddac705a00cface3cbfa1d7f069
SHA51266ba9ed6bd3a2755e848debe785f19db1187ccd3c11a05c87ae0d875dcf01b79b2377f01b6421996a246516809e78cdaa4d919f39c67f719f70e80c2223d0a9d
-
Filesize
459KB
MD5c18ce635d6d9106610d11398b938e462
SHA1c5c1ee545a2145920711b10ddf89e93c9c833483
SHA2565ff013f7fdf8466b0601f38b95111b2fa9963ddac705a00cface3cbfa1d7f069
SHA51266ba9ed6bd3a2755e848debe785f19db1187ccd3c11a05c87ae0d875dcf01b79b2377f01b6421996a246516809e78cdaa4d919f39c67f719f70e80c2223d0a9d