Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
193s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:35
Static task
static1
Behavioral task
behavioral1
Sample
42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee.exe
Resource
win10v2004-20230220-en
General
-
Target
42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee.exe
-
Size
479KB
-
MD5
8fa03ba8d6cf5b72d02080a57c6cd1e2
-
SHA1
f23aff55bd0b99dd493f8d94a8369aeda50d5515
-
SHA256
42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee
-
SHA512
cf64ceabf769f1949948a3f064a12eee30d158f421607befa3252e3ff187f673853556a2ab66b43e1c9f7a7860dfcf14551348c8c8925fb986d7cf61432e4a92
-
SSDEEP
6144:KRy+bnr+Ip0yN90QEnWrRQVPIF0+1YqkyJZlEYnzbPs5qJpjl9iobv6dp3yYWn3V:DMrky90QGVPIFrKPyJZbnzSUERpjv0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k0290891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k0290891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k0290891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k0290891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k0290891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k0290891.exe -
Executes dropped EXE 3 IoCs
pid Process 2044 y6844578.exe 980 k0290891.exe 1260 l6355288.exe -
Loads dropped DLL 6 IoCs
pid Process 860 42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee.exe 2044 y6844578.exe 2044 y6844578.exe 980 k0290891.exe 2044 y6844578.exe 1260 l6355288.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features k0290891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k0290891.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y6844578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y6844578.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 980 k0290891.exe 980 k0290891.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 980 k0290891.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 860 wrote to memory of 2044 860 42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee.exe 28 PID 860 wrote to memory of 2044 860 42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee.exe 28 PID 860 wrote to memory of 2044 860 42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee.exe 28 PID 860 wrote to memory of 2044 860 42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee.exe 28 PID 860 wrote to memory of 2044 860 42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee.exe 28 PID 860 wrote to memory of 2044 860 42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee.exe 28 PID 860 wrote to memory of 2044 860 42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee.exe 28 PID 2044 wrote to memory of 980 2044 y6844578.exe 29 PID 2044 wrote to memory of 980 2044 y6844578.exe 29 PID 2044 wrote to memory of 980 2044 y6844578.exe 29 PID 2044 wrote to memory of 980 2044 y6844578.exe 29 PID 2044 wrote to memory of 980 2044 y6844578.exe 29 PID 2044 wrote to memory of 980 2044 y6844578.exe 29 PID 2044 wrote to memory of 980 2044 y6844578.exe 29 PID 2044 wrote to memory of 1260 2044 y6844578.exe 30 PID 2044 wrote to memory of 1260 2044 y6844578.exe 30 PID 2044 wrote to memory of 1260 2044 y6844578.exe 30 PID 2044 wrote to memory of 1260 2044 y6844578.exe 30 PID 2044 wrote to memory of 1260 2044 y6844578.exe 30 PID 2044 wrote to memory of 1260 2044 y6844578.exe 30 PID 2044 wrote to memory of 1260 2044 y6844578.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee.exe"C:\Users\Admin\AppData\Local\Temp\42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6844578.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6844578.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0290891.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0290891.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6355288.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6355288.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1260
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD571049c4bc5ab36dc073cf7d8ddfc7648
SHA160d686b93cedb076e2d275441bd4a0eec20853d5
SHA256a72842a24243d60b2cbf4bea83f8193b582f02e2f40f19b38bb79b81dfd13ef5
SHA5122a925f78d2209ad202146d6a5a12eca0d2917edb697805f9fb72a30e15f5e923defd6ed727cdf0efea6d93592d6ef3cfddce0c00d2d83c64bcf466faee3593a1
-
Filesize
308KB
MD571049c4bc5ab36dc073cf7d8ddfc7648
SHA160d686b93cedb076e2d275441bd4a0eec20853d5
SHA256a72842a24243d60b2cbf4bea83f8193b582f02e2f40f19b38bb79b81dfd13ef5
SHA5122a925f78d2209ad202146d6a5a12eca0d2917edb697805f9fb72a30e15f5e923defd6ed727cdf0efea6d93592d6ef3cfddce0c00d2d83c64bcf466faee3593a1
-
Filesize
176KB
MD5c84ba20ff49929fab6cd9b23e9e742a6
SHA1d1325e3b07eccf4a1a2acbf030341493586aa76f
SHA256ecc667cc08f5d444328e7fa1c04485dbbe79d553e85a12036b078c1319d0c3e7
SHA51262988e40787bf41b43fc82c90f715d79206cc98f6e6a0b2318fbecfc73b4b07004b8a40f9c31bab374a57dbcbd26654d6ed98498264d588ca029ad276cbdedba
-
Filesize
176KB
MD5c84ba20ff49929fab6cd9b23e9e742a6
SHA1d1325e3b07eccf4a1a2acbf030341493586aa76f
SHA256ecc667cc08f5d444328e7fa1c04485dbbe79d553e85a12036b078c1319d0c3e7
SHA51262988e40787bf41b43fc82c90f715d79206cc98f6e6a0b2318fbecfc73b4b07004b8a40f9c31bab374a57dbcbd26654d6ed98498264d588ca029ad276cbdedba
-
Filesize
136KB
MD59a5f3a1f4992096ff6972577177ec5b2
SHA134018bea2cca77008975b86b601280e753782280
SHA2562cece02c68cf8f7220d30614ffa7f4f8f30548511acd6bef8f4a4bbf1e6bf725
SHA512247ed5a518d67dbded2440a409c76320a45364662ed6ae3bab1810f1b56e8f901ef6bbceb33d05ded118f9e68841c096cfb06969f4f06bc88d8fd0fc1cb68ff9
-
Filesize
136KB
MD59a5f3a1f4992096ff6972577177ec5b2
SHA134018bea2cca77008975b86b601280e753782280
SHA2562cece02c68cf8f7220d30614ffa7f4f8f30548511acd6bef8f4a4bbf1e6bf725
SHA512247ed5a518d67dbded2440a409c76320a45364662ed6ae3bab1810f1b56e8f901ef6bbceb33d05ded118f9e68841c096cfb06969f4f06bc88d8fd0fc1cb68ff9
-
Filesize
308KB
MD571049c4bc5ab36dc073cf7d8ddfc7648
SHA160d686b93cedb076e2d275441bd4a0eec20853d5
SHA256a72842a24243d60b2cbf4bea83f8193b582f02e2f40f19b38bb79b81dfd13ef5
SHA5122a925f78d2209ad202146d6a5a12eca0d2917edb697805f9fb72a30e15f5e923defd6ed727cdf0efea6d93592d6ef3cfddce0c00d2d83c64bcf466faee3593a1
-
Filesize
308KB
MD571049c4bc5ab36dc073cf7d8ddfc7648
SHA160d686b93cedb076e2d275441bd4a0eec20853d5
SHA256a72842a24243d60b2cbf4bea83f8193b582f02e2f40f19b38bb79b81dfd13ef5
SHA5122a925f78d2209ad202146d6a5a12eca0d2917edb697805f9fb72a30e15f5e923defd6ed727cdf0efea6d93592d6ef3cfddce0c00d2d83c64bcf466faee3593a1
-
Filesize
176KB
MD5c84ba20ff49929fab6cd9b23e9e742a6
SHA1d1325e3b07eccf4a1a2acbf030341493586aa76f
SHA256ecc667cc08f5d444328e7fa1c04485dbbe79d553e85a12036b078c1319d0c3e7
SHA51262988e40787bf41b43fc82c90f715d79206cc98f6e6a0b2318fbecfc73b4b07004b8a40f9c31bab374a57dbcbd26654d6ed98498264d588ca029ad276cbdedba
-
Filesize
176KB
MD5c84ba20ff49929fab6cd9b23e9e742a6
SHA1d1325e3b07eccf4a1a2acbf030341493586aa76f
SHA256ecc667cc08f5d444328e7fa1c04485dbbe79d553e85a12036b078c1319d0c3e7
SHA51262988e40787bf41b43fc82c90f715d79206cc98f6e6a0b2318fbecfc73b4b07004b8a40f9c31bab374a57dbcbd26654d6ed98498264d588ca029ad276cbdedba
-
Filesize
136KB
MD59a5f3a1f4992096ff6972577177ec5b2
SHA134018bea2cca77008975b86b601280e753782280
SHA2562cece02c68cf8f7220d30614ffa7f4f8f30548511acd6bef8f4a4bbf1e6bf725
SHA512247ed5a518d67dbded2440a409c76320a45364662ed6ae3bab1810f1b56e8f901ef6bbceb33d05ded118f9e68841c096cfb06969f4f06bc88d8fd0fc1cb68ff9
-
Filesize
136KB
MD59a5f3a1f4992096ff6972577177ec5b2
SHA134018bea2cca77008975b86b601280e753782280
SHA2562cece02c68cf8f7220d30614ffa7f4f8f30548511acd6bef8f4a4bbf1e6bf725
SHA512247ed5a518d67dbded2440a409c76320a45364662ed6ae3bab1810f1b56e8f901ef6bbceb33d05ded118f9e68841c096cfb06969f4f06bc88d8fd0fc1cb68ff9