Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:35
Static task
static1
Behavioral task
behavioral1
Sample
4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d.exe
Resource
win10v2004-20230220-en
General
-
Target
4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d.exe
-
Size
747KB
-
MD5
e98ec7a8ec64df9a42fbe22c7c441fa8
-
SHA1
4d487c60d7e64b08cc28ff9dc3ad719bb870dc3c
-
SHA256
4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d
-
SHA512
9af8df4894db7086e88b609d5681ba0233cd5ec0d677dcc0d77bd2186e3afbbca752a3fb4bcbf4ef915cdd49ad71616355e8488a3dcc2c5fbfa44f8ebe59dc0b
-
SSDEEP
12288:vy90Qbde6OAXQvEu05q6bCSaUmh7pyawKWU9Ur7TqRUyCi:vyXoE95qSv+7/yTq1Ci
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 95478020.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 95478020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 95478020.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 95478020.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 95478020.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 95478020.exe -
Executes dropped EXE 3 IoCs
pid Process 1192 un650476.exe 848 95478020.exe 748 rk481565.exe -
Loads dropped DLL 8 IoCs
pid Process 1556 4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d.exe 1192 un650476.exe 1192 un650476.exe 1192 un650476.exe 848 95478020.exe 1192 un650476.exe 1192 un650476.exe 748 rk481565.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 95478020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 95478020.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un650476.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un650476.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 848 95478020.exe 848 95478020.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 848 95478020.exe Token: SeDebugPrivilege 748 rk481565.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1556 wrote to memory of 1192 1556 4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d.exe 28 PID 1556 wrote to memory of 1192 1556 4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d.exe 28 PID 1556 wrote to memory of 1192 1556 4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d.exe 28 PID 1556 wrote to memory of 1192 1556 4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d.exe 28 PID 1556 wrote to memory of 1192 1556 4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d.exe 28 PID 1556 wrote to memory of 1192 1556 4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d.exe 28 PID 1556 wrote to memory of 1192 1556 4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d.exe 28 PID 1192 wrote to memory of 848 1192 un650476.exe 29 PID 1192 wrote to memory of 848 1192 un650476.exe 29 PID 1192 wrote to memory of 848 1192 un650476.exe 29 PID 1192 wrote to memory of 848 1192 un650476.exe 29 PID 1192 wrote to memory of 848 1192 un650476.exe 29 PID 1192 wrote to memory of 848 1192 un650476.exe 29 PID 1192 wrote to memory of 848 1192 un650476.exe 29 PID 1192 wrote to memory of 748 1192 un650476.exe 30 PID 1192 wrote to memory of 748 1192 un650476.exe 30 PID 1192 wrote to memory of 748 1192 un650476.exe 30 PID 1192 wrote to memory of 748 1192 un650476.exe 30 PID 1192 wrote to memory of 748 1192 un650476.exe 30 PID 1192 wrote to memory of 748 1192 un650476.exe 30 PID 1192 wrote to memory of 748 1192 un650476.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d.exe"C:\Users\Admin\AppData\Local\Temp\4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un650476.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un650476.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\95478020.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\95478020.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk481565.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk481565.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:748
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5946315dd9d1081f780642b371226eab0
SHA10e3725a53a44d2dde7767791406161ce14ab054c
SHA2562e487294bb4cf571aa979adf9892784e184b3824c0f8c2ce33bdb3c51bcfa054
SHA5128cb800e240c5b776c01d90e9d60420d6d7267745057ae369167863368826baa9ab2540e9ba769f086310c02155181d6686d35ec3d8398ed5bd2fc66373cbea3a
-
Filesize
593KB
MD5946315dd9d1081f780642b371226eab0
SHA10e3725a53a44d2dde7767791406161ce14ab054c
SHA2562e487294bb4cf571aa979adf9892784e184b3824c0f8c2ce33bdb3c51bcfa054
SHA5128cb800e240c5b776c01d90e9d60420d6d7267745057ae369167863368826baa9ab2540e9ba769f086310c02155181d6686d35ec3d8398ed5bd2fc66373cbea3a
-
Filesize
377KB
MD507dc6fe6f7351ff67a1fd0e6bfbd51e3
SHA1a1881c8f03bb323408b4a5b46cb41e435b7037b2
SHA256a6b8e0b91961b03bfd7ffd9f60e18c5286eb67b3661dca0157e5a870ea7904e0
SHA512d57798978cc2393f71c14b7cac5100c16002fa8368b3d241736b3a6c81926938f4b75e0b5c9536f48e269c5bef5b274f36b66de3e9e169a5d6a5b99c250376bd
-
Filesize
377KB
MD507dc6fe6f7351ff67a1fd0e6bfbd51e3
SHA1a1881c8f03bb323408b4a5b46cb41e435b7037b2
SHA256a6b8e0b91961b03bfd7ffd9f60e18c5286eb67b3661dca0157e5a870ea7904e0
SHA512d57798978cc2393f71c14b7cac5100c16002fa8368b3d241736b3a6c81926938f4b75e0b5c9536f48e269c5bef5b274f36b66de3e9e169a5d6a5b99c250376bd
-
Filesize
377KB
MD507dc6fe6f7351ff67a1fd0e6bfbd51e3
SHA1a1881c8f03bb323408b4a5b46cb41e435b7037b2
SHA256a6b8e0b91961b03bfd7ffd9f60e18c5286eb67b3661dca0157e5a870ea7904e0
SHA512d57798978cc2393f71c14b7cac5100c16002fa8368b3d241736b3a6c81926938f4b75e0b5c9536f48e269c5bef5b274f36b66de3e9e169a5d6a5b99c250376bd
-
Filesize
460KB
MD5ea7a7e86eebd76d894a80466ddea56a5
SHA17063f6ec517966e63a485f8a386d7e05f1ab48fa
SHA256cb0349d7f2f388159c26592429b39d78b636f7e28691cb53465e4ceb6cdd4016
SHA5123cb4256c263f177dba7f341783c28985a71b5f220a1eb02df8c9611faedc36366723f2629036d27c157bce5f9d9ff941fa7c288961e0500e0966369c9dafaa54
-
Filesize
460KB
MD5ea7a7e86eebd76d894a80466ddea56a5
SHA17063f6ec517966e63a485f8a386d7e05f1ab48fa
SHA256cb0349d7f2f388159c26592429b39d78b636f7e28691cb53465e4ceb6cdd4016
SHA5123cb4256c263f177dba7f341783c28985a71b5f220a1eb02df8c9611faedc36366723f2629036d27c157bce5f9d9ff941fa7c288961e0500e0966369c9dafaa54
-
Filesize
460KB
MD5ea7a7e86eebd76d894a80466ddea56a5
SHA17063f6ec517966e63a485f8a386d7e05f1ab48fa
SHA256cb0349d7f2f388159c26592429b39d78b636f7e28691cb53465e4ceb6cdd4016
SHA5123cb4256c263f177dba7f341783c28985a71b5f220a1eb02df8c9611faedc36366723f2629036d27c157bce5f9d9ff941fa7c288961e0500e0966369c9dafaa54
-
Filesize
593KB
MD5946315dd9d1081f780642b371226eab0
SHA10e3725a53a44d2dde7767791406161ce14ab054c
SHA2562e487294bb4cf571aa979adf9892784e184b3824c0f8c2ce33bdb3c51bcfa054
SHA5128cb800e240c5b776c01d90e9d60420d6d7267745057ae369167863368826baa9ab2540e9ba769f086310c02155181d6686d35ec3d8398ed5bd2fc66373cbea3a
-
Filesize
593KB
MD5946315dd9d1081f780642b371226eab0
SHA10e3725a53a44d2dde7767791406161ce14ab054c
SHA2562e487294bb4cf571aa979adf9892784e184b3824c0f8c2ce33bdb3c51bcfa054
SHA5128cb800e240c5b776c01d90e9d60420d6d7267745057ae369167863368826baa9ab2540e9ba769f086310c02155181d6686d35ec3d8398ed5bd2fc66373cbea3a
-
Filesize
377KB
MD507dc6fe6f7351ff67a1fd0e6bfbd51e3
SHA1a1881c8f03bb323408b4a5b46cb41e435b7037b2
SHA256a6b8e0b91961b03bfd7ffd9f60e18c5286eb67b3661dca0157e5a870ea7904e0
SHA512d57798978cc2393f71c14b7cac5100c16002fa8368b3d241736b3a6c81926938f4b75e0b5c9536f48e269c5bef5b274f36b66de3e9e169a5d6a5b99c250376bd
-
Filesize
377KB
MD507dc6fe6f7351ff67a1fd0e6bfbd51e3
SHA1a1881c8f03bb323408b4a5b46cb41e435b7037b2
SHA256a6b8e0b91961b03bfd7ffd9f60e18c5286eb67b3661dca0157e5a870ea7904e0
SHA512d57798978cc2393f71c14b7cac5100c16002fa8368b3d241736b3a6c81926938f4b75e0b5c9536f48e269c5bef5b274f36b66de3e9e169a5d6a5b99c250376bd
-
Filesize
377KB
MD507dc6fe6f7351ff67a1fd0e6bfbd51e3
SHA1a1881c8f03bb323408b4a5b46cb41e435b7037b2
SHA256a6b8e0b91961b03bfd7ffd9f60e18c5286eb67b3661dca0157e5a870ea7904e0
SHA512d57798978cc2393f71c14b7cac5100c16002fa8368b3d241736b3a6c81926938f4b75e0b5c9536f48e269c5bef5b274f36b66de3e9e169a5d6a5b99c250376bd
-
Filesize
460KB
MD5ea7a7e86eebd76d894a80466ddea56a5
SHA17063f6ec517966e63a485f8a386d7e05f1ab48fa
SHA256cb0349d7f2f388159c26592429b39d78b636f7e28691cb53465e4ceb6cdd4016
SHA5123cb4256c263f177dba7f341783c28985a71b5f220a1eb02df8c9611faedc36366723f2629036d27c157bce5f9d9ff941fa7c288961e0500e0966369c9dafaa54
-
Filesize
460KB
MD5ea7a7e86eebd76d894a80466ddea56a5
SHA17063f6ec517966e63a485f8a386d7e05f1ab48fa
SHA256cb0349d7f2f388159c26592429b39d78b636f7e28691cb53465e4ceb6cdd4016
SHA5123cb4256c263f177dba7f341783c28985a71b5f220a1eb02df8c9611faedc36366723f2629036d27c157bce5f9d9ff941fa7c288961e0500e0966369c9dafaa54
-
Filesize
460KB
MD5ea7a7e86eebd76d894a80466ddea56a5
SHA17063f6ec517966e63a485f8a386d7e05f1ab48fa
SHA256cb0349d7f2f388159c26592429b39d78b636f7e28691cb53465e4ceb6cdd4016
SHA5123cb4256c263f177dba7f341783c28985a71b5f220a1eb02df8c9611faedc36366723f2629036d27c157bce5f9d9ff941fa7c288961e0500e0966369c9dafaa54