Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:33
Static task
static1
Behavioral task
behavioral1
Sample
410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c.exe
Resource
win10v2004-20230220-en
General
-
Target
410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c.exe
-
Size
694KB
-
MD5
b050121b8d0590893174d1ed7bac78be
-
SHA1
e20c2d8cc424e0e90b64bd56c83983202ec40e4c
-
SHA256
410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c
-
SHA512
7005762d69a026573ee15148ece619409217d1bcdd5e4d4a72d460e8acb81a9581994ffcac8ff1ff44690520198977867f6b0221e8b38fa206c8574ebf44a897
-
SSDEEP
12288:gy90lyvACCyR46ZL+IwMkMoLx3RjWEz7wa8qqsclYk:gyZ4pyR46L+ukfd31Ws7Es0Yk
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 45418577.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 45418577.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 45418577.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 45418577.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 45418577.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 45418577.exe -
Executes dropped EXE 3 IoCs
pid Process 1992 un204091.exe 788 45418577.exe 1908 rk756052.exe -
Loads dropped DLL 8 IoCs
pid Process 2044 410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c.exe 1992 un204091.exe 1992 un204091.exe 1992 un204091.exe 788 45418577.exe 1992 un204091.exe 1992 un204091.exe 1908 rk756052.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 45418577.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 45418577.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un204091.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un204091.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 788 45418577.exe 788 45418577.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 788 45418577.exe Token: SeDebugPrivilege 1908 rk756052.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1992 2044 410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c.exe 28 PID 2044 wrote to memory of 1992 2044 410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c.exe 28 PID 2044 wrote to memory of 1992 2044 410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c.exe 28 PID 2044 wrote to memory of 1992 2044 410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c.exe 28 PID 2044 wrote to memory of 1992 2044 410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c.exe 28 PID 2044 wrote to memory of 1992 2044 410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c.exe 28 PID 2044 wrote to memory of 1992 2044 410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c.exe 28 PID 1992 wrote to memory of 788 1992 un204091.exe 29 PID 1992 wrote to memory of 788 1992 un204091.exe 29 PID 1992 wrote to memory of 788 1992 un204091.exe 29 PID 1992 wrote to memory of 788 1992 un204091.exe 29 PID 1992 wrote to memory of 788 1992 un204091.exe 29 PID 1992 wrote to memory of 788 1992 un204091.exe 29 PID 1992 wrote to memory of 788 1992 un204091.exe 29 PID 1992 wrote to memory of 1908 1992 un204091.exe 30 PID 1992 wrote to memory of 1908 1992 un204091.exe 30 PID 1992 wrote to memory of 1908 1992 un204091.exe 30 PID 1992 wrote to memory of 1908 1992 un204091.exe 30 PID 1992 wrote to memory of 1908 1992 un204091.exe 30 PID 1992 wrote to memory of 1908 1992 un204091.exe 30 PID 1992 wrote to memory of 1908 1992 un204091.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c.exe"C:\Users\Admin\AppData\Local\Temp\410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un204091.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un204091.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\45418577.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\45418577.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:788
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk756052.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk756052.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD5f0f6437b295c4efe00064ed1ff4de26d
SHA191906b2e7594b3218daf83cd57f0372599efe02c
SHA256772f4d6aae21db25eed0a5ca6a4c7ac89522a87b9431402c3fe37deaafe91e71
SHA512404809c6bfea8579f7de715ee7846545676b33a0e119ca0abd0825f156e1c82e892a83c061a1f8ed491450ff35cb7dcd02f528d4998b83e0d92c1dad85ca9c49
-
Filesize
540KB
MD5f0f6437b295c4efe00064ed1ff4de26d
SHA191906b2e7594b3218daf83cd57f0372599efe02c
SHA256772f4d6aae21db25eed0a5ca6a4c7ac89522a87b9431402c3fe37deaafe91e71
SHA512404809c6bfea8579f7de715ee7846545676b33a0e119ca0abd0825f156e1c82e892a83c061a1f8ed491450ff35cb7dcd02f528d4998b83e0d92c1dad85ca9c49
-
Filesize
258KB
MD57936d826c83b985c0c0c2747b943a5c7
SHA1e180f244b5d8523f63702311df89d8ddf6ddcdaf
SHA256f0630acc9c36a7148fbeff75dd39b929d2501be6e6db7b05b55f6c303e0a1d2e
SHA51287a46178853ac939643b8293a07a604b0753906e6083db88a53a1358bb5bdddf61c3a8d98117c58cdd29ebb6886f7eba5731baf06c7eb1615090d0d981f59d10
-
Filesize
258KB
MD57936d826c83b985c0c0c2747b943a5c7
SHA1e180f244b5d8523f63702311df89d8ddf6ddcdaf
SHA256f0630acc9c36a7148fbeff75dd39b929d2501be6e6db7b05b55f6c303e0a1d2e
SHA51287a46178853ac939643b8293a07a604b0753906e6083db88a53a1358bb5bdddf61c3a8d98117c58cdd29ebb6886f7eba5731baf06c7eb1615090d0d981f59d10
-
Filesize
258KB
MD57936d826c83b985c0c0c2747b943a5c7
SHA1e180f244b5d8523f63702311df89d8ddf6ddcdaf
SHA256f0630acc9c36a7148fbeff75dd39b929d2501be6e6db7b05b55f6c303e0a1d2e
SHA51287a46178853ac939643b8293a07a604b0753906e6083db88a53a1358bb5bdddf61c3a8d98117c58cdd29ebb6886f7eba5731baf06c7eb1615090d0d981f59d10
-
Filesize
340KB
MD58e2a92da82d5e81b863f69b39eea2b0a
SHA13a3107b308e197cd7e06ad2c86b9f8fe7dfc707d
SHA256700c7983b0b19fc32f501b2e20554c4e00ecf84a66a067f1cbd18a3b4749052e
SHA5126fd2c3477baf86759bc915c9557f95dbd1363ea3102933ddc2ed43613b18591724fee4c7d6caa1aa12b7c4fb2ccd1b3b8fc221a472b00dd0fc2e6364249b349e
-
Filesize
340KB
MD58e2a92da82d5e81b863f69b39eea2b0a
SHA13a3107b308e197cd7e06ad2c86b9f8fe7dfc707d
SHA256700c7983b0b19fc32f501b2e20554c4e00ecf84a66a067f1cbd18a3b4749052e
SHA5126fd2c3477baf86759bc915c9557f95dbd1363ea3102933ddc2ed43613b18591724fee4c7d6caa1aa12b7c4fb2ccd1b3b8fc221a472b00dd0fc2e6364249b349e
-
Filesize
340KB
MD58e2a92da82d5e81b863f69b39eea2b0a
SHA13a3107b308e197cd7e06ad2c86b9f8fe7dfc707d
SHA256700c7983b0b19fc32f501b2e20554c4e00ecf84a66a067f1cbd18a3b4749052e
SHA5126fd2c3477baf86759bc915c9557f95dbd1363ea3102933ddc2ed43613b18591724fee4c7d6caa1aa12b7c4fb2ccd1b3b8fc221a472b00dd0fc2e6364249b349e
-
Filesize
540KB
MD5f0f6437b295c4efe00064ed1ff4de26d
SHA191906b2e7594b3218daf83cd57f0372599efe02c
SHA256772f4d6aae21db25eed0a5ca6a4c7ac89522a87b9431402c3fe37deaafe91e71
SHA512404809c6bfea8579f7de715ee7846545676b33a0e119ca0abd0825f156e1c82e892a83c061a1f8ed491450ff35cb7dcd02f528d4998b83e0d92c1dad85ca9c49
-
Filesize
540KB
MD5f0f6437b295c4efe00064ed1ff4de26d
SHA191906b2e7594b3218daf83cd57f0372599efe02c
SHA256772f4d6aae21db25eed0a5ca6a4c7ac89522a87b9431402c3fe37deaafe91e71
SHA512404809c6bfea8579f7de715ee7846545676b33a0e119ca0abd0825f156e1c82e892a83c061a1f8ed491450ff35cb7dcd02f528d4998b83e0d92c1dad85ca9c49
-
Filesize
258KB
MD57936d826c83b985c0c0c2747b943a5c7
SHA1e180f244b5d8523f63702311df89d8ddf6ddcdaf
SHA256f0630acc9c36a7148fbeff75dd39b929d2501be6e6db7b05b55f6c303e0a1d2e
SHA51287a46178853ac939643b8293a07a604b0753906e6083db88a53a1358bb5bdddf61c3a8d98117c58cdd29ebb6886f7eba5731baf06c7eb1615090d0d981f59d10
-
Filesize
258KB
MD57936d826c83b985c0c0c2747b943a5c7
SHA1e180f244b5d8523f63702311df89d8ddf6ddcdaf
SHA256f0630acc9c36a7148fbeff75dd39b929d2501be6e6db7b05b55f6c303e0a1d2e
SHA51287a46178853ac939643b8293a07a604b0753906e6083db88a53a1358bb5bdddf61c3a8d98117c58cdd29ebb6886f7eba5731baf06c7eb1615090d0d981f59d10
-
Filesize
258KB
MD57936d826c83b985c0c0c2747b943a5c7
SHA1e180f244b5d8523f63702311df89d8ddf6ddcdaf
SHA256f0630acc9c36a7148fbeff75dd39b929d2501be6e6db7b05b55f6c303e0a1d2e
SHA51287a46178853ac939643b8293a07a604b0753906e6083db88a53a1358bb5bdddf61c3a8d98117c58cdd29ebb6886f7eba5731baf06c7eb1615090d0d981f59d10
-
Filesize
340KB
MD58e2a92da82d5e81b863f69b39eea2b0a
SHA13a3107b308e197cd7e06ad2c86b9f8fe7dfc707d
SHA256700c7983b0b19fc32f501b2e20554c4e00ecf84a66a067f1cbd18a3b4749052e
SHA5126fd2c3477baf86759bc915c9557f95dbd1363ea3102933ddc2ed43613b18591724fee4c7d6caa1aa12b7c4fb2ccd1b3b8fc221a472b00dd0fc2e6364249b349e
-
Filesize
340KB
MD58e2a92da82d5e81b863f69b39eea2b0a
SHA13a3107b308e197cd7e06ad2c86b9f8fe7dfc707d
SHA256700c7983b0b19fc32f501b2e20554c4e00ecf84a66a067f1cbd18a3b4749052e
SHA5126fd2c3477baf86759bc915c9557f95dbd1363ea3102933ddc2ed43613b18591724fee4c7d6caa1aa12b7c4fb2ccd1b3b8fc221a472b00dd0fc2e6364249b349e
-
Filesize
340KB
MD58e2a92da82d5e81b863f69b39eea2b0a
SHA13a3107b308e197cd7e06ad2c86b9f8fe7dfc707d
SHA256700c7983b0b19fc32f501b2e20554c4e00ecf84a66a067f1cbd18a3b4749052e
SHA5126fd2c3477baf86759bc915c9557f95dbd1363ea3102933ddc2ed43613b18591724fee4c7d6caa1aa12b7c4fb2ccd1b3b8fc221a472b00dd0fc2e6364249b349e