Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
186s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:35
Static task
static1
Behavioral task
behavioral1
Sample
4323f974ae1cc1826b57265d544fd81b6667936a653595a57fbab8f8b01991ad.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4323f974ae1cc1826b57265d544fd81b6667936a653595a57fbab8f8b01991ad.exe
Resource
win10v2004-20230220-en
General
-
Target
4323f974ae1cc1826b57265d544fd81b6667936a653595a57fbab8f8b01991ad.exe
-
Size
1.2MB
-
MD5
84ed2559bbd16d307d66b45160257f94
-
SHA1
bcb249a8f31866a524fccf5fab8f8fe21e997311
-
SHA256
4323f974ae1cc1826b57265d544fd81b6667936a653595a57fbab8f8b01991ad
-
SHA512
6f95d422572783878c9a246e03d60b9aa5924781af51c4941f83b6ae14239ba62ee72862cbb25dd49b8e7c2f17eb3cbb0118715f5cfa34e011e60f644ba3383b
-
SSDEEP
24576:DcfsVIKzRLTr3vkFjAacR3lMERO6s0fYK++YSYuugo4cyC/:Dc+I8X8FjAacEER9NYK+lngo4cyC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 125528770.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 125528770.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 125528770.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 125528770.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 125528770.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 125528770.exe -
Executes dropped EXE 4 IoCs
pid Process 1652 An695336.exe 2020 SU691447.exe 1208 125528770.exe 1092 202729656.exe -
Loads dropped DLL 10 IoCs
pid Process 1708 4323f974ae1cc1826b57265d544fd81b6667936a653595a57fbab8f8b01991ad.exe 1652 An695336.exe 1652 An695336.exe 2020 SU691447.exe 2020 SU691447.exe 2020 SU691447.exe 1208 125528770.exe 2020 SU691447.exe 2020 SU691447.exe 1092 202729656.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 125528770.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 125528770.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4323f974ae1cc1826b57265d544fd81b6667936a653595a57fbab8f8b01991ad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4323f974ae1cc1826b57265d544fd81b6667936a653595a57fbab8f8b01991ad.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce An695336.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" An695336.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce SU691447.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" SU691447.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1208 125528770.exe 1208 125528770.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1208 125528770.exe Token: SeDebugPrivilege 1092 202729656.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1652 1708 4323f974ae1cc1826b57265d544fd81b6667936a653595a57fbab8f8b01991ad.exe 28 PID 1708 wrote to memory of 1652 1708 4323f974ae1cc1826b57265d544fd81b6667936a653595a57fbab8f8b01991ad.exe 28 PID 1708 wrote to memory of 1652 1708 4323f974ae1cc1826b57265d544fd81b6667936a653595a57fbab8f8b01991ad.exe 28 PID 1708 wrote to memory of 1652 1708 4323f974ae1cc1826b57265d544fd81b6667936a653595a57fbab8f8b01991ad.exe 28 PID 1708 wrote to memory of 1652 1708 4323f974ae1cc1826b57265d544fd81b6667936a653595a57fbab8f8b01991ad.exe 28 PID 1708 wrote to memory of 1652 1708 4323f974ae1cc1826b57265d544fd81b6667936a653595a57fbab8f8b01991ad.exe 28 PID 1708 wrote to memory of 1652 1708 4323f974ae1cc1826b57265d544fd81b6667936a653595a57fbab8f8b01991ad.exe 28 PID 1652 wrote to memory of 2020 1652 An695336.exe 29 PID 1652 wrote to memory of 2020 1652 An695336.exe 29 PID 1652 wrote to memory of 2020 1652 An695336.exe 29 PID 1652 wrote to memory of 2020 1652 An695336.exe 29 PID 1652 wrote to memory of 2020 1652 An695336.exe 29 PID 1652 wrote to memory of 2020 1652 An695336.exe 29 PID 1652 wrote to memory of 2020 1652 An695336.exe 29 PID 2020 wrote to memory of 1208 2020 SU691447.exe 30 PID 2020 wrote to memory of 1208 2020 SU691447.exe 30 PID 2020 wrote to memory of 1208 2020 SU691447.exe 30 PID 2020 wrote to memory of 1208 2020 SU691447.exe 30 PID 2020 wrote to memory of 1208 2020 SU691447.exe 30 PID 2020 wrote to memory of 1208 2020 SU691447.exe 30 PID 2020 wrote to memory of 1208 2020 SU691447.exe 30 PID 2020 wrote to memory of 1092 2020 SU691447.exe 31 PID 2020 wrote to memory of 1092 2020 SU691447.exe 31 PID 2020 wrote to memory of 1092 2020 SU691447.exe 31 PID 2020 wrote to memory of 1092 2020 SU691447.exe 31 PID 2020 wrote to memory of 1092 2020 SU691447.exe 31 PID 2020 wrote to memory of 1092 2020 SU691447.exe 31 PID 2020 wrote to memory of 1092 2020 SU691447.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4323f974ae1cc1826b57265d544fd81b6667936a653595a57fbab8f8b01991ad.exe"C:\Users\Admin\AppData\Local\Temp\4323f974ae1cc1826b57265d544fd81b6667936a653595a57fbab8f8b01991ad.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\An695336.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\An695336.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\SU691447.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\SU691447.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\125528770.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\125528770.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\202729656.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\202729656.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
769KB
MD5f3b2db45fcda76cc8e7b7e073a5c590d
SHA13fd774e017877e9b3dafdf1ee33f9bdabb58807b
SHA25679c48fd5b19f5d2bcdae8843ed54710b279ae99948c3ff47f192dc4bb8bc57ae
SHA5126cf83d6720aeed8e30a2a0f7a4f1a1e39fbfa11248ac7b2fe63f21f847a78d4a3503e9f77fd4ec069ff4429dd33cb3196fc64be564ced0ecd227fd9b1b989cfe
-
Filesize
769KB
MD5f3b2db45fcda76cc8e7b7e073a5c590d
SHA13fd774e017877e9b3dafdf1ee33f9bdabb58807b
SHA25679c48fd5b19f5d2bcdae8843ed54710b279ae99948c3ff47f192dc4bb8bc57ae
SHA5126cf83d6720aeed8e30a2a0f7a4f1a1e39fbfa11248ac7b2fe63f21f847a78d4a3503e9f77fd4ec069ff4429dd33cb3196fc64be564ced0ecd227fd9b1b989cfe
-
Filesize
598KB
MD5a64ddcbd73e4f21d43b3a372a6a10f4f
SHA1d5537b250d5690e1777d144b5f88950f89591599
SHA2566b90f497e0dfed0928981463974ef20d1dc91656c83390ba70faf4b0793ef6fb
SHA51294e460c1cd1587fcccd5380cc29ec64016271e90e5f7f0bb2254ebdc39c8563dafcca34c45c6ad242072b1ed802c629eb13cec96dbe5585380796a3b2954cab8
-
Filesize
598KB
MD5a64ddcbd73e4f21d43b3a372a6a10f4f
SHA1d5537b250d5690e1777d144b5f88950f89591599
SHA2566b90f497e0dfed0928981463974ef20d1dc91656c83390ba70faf4b0793ef6fb
SHA51294e460c1cd1587fcccd5380cc29ec64016271e90e5f7f0bb2254ebdc39c8563dafcca34c45c6ad242072b1ed802c629eb13cec96dbe5585380796a3b2954cab8
-
Filesize
390KB
MD523e825b68c23f4170d41b2566984cea5
SHA198776eb6b3ffc66fb69620094a0d9d9b33ec0880
SHA256a630ed031d7fd2545de81a9eaafe5b4f502b42a65a4280594bd4d9b626855657
SHA51245e03897d977e289ac459774de1fa28de0f79d86bf20a55e79c160158640c7ce2841b8c363729fccc290a18705127f8f127fd071f1505852262aac8600e881b5
-
Filesize
390KB
MD523e825b68c23f4170d41b2566984cea5
SHA198776eb6b3ffc66fb69620094a0d9d9b33ec0880
SHA256a630ed031d7fd2545de81a9eaafe5b4f502b42a65a4280594bd4d9b626855657
SHA51245e03897d977e289ac459774de1fa28de0f79d86bf20a55e79c160158640c7ce2841b8c363729fccc290a18705127f8f127fd071f1505852262aac8600e881b5
-
Filesize
390KB
MD523e825b68c23f4170d41b2566984cea5
SHA198776eb6b3ffc66fb69620094a0d9d9b33ec0880
SHA256a630ed031d7fd2545de81a9eaafe5b4f502b42a65a4280594bd4d9b626855657
SHA51245e03897d977e289ac459774de1fa28de0f79d86bf20a55e79c160158640c7ce2841b8c363729fccc290a18705127f8f127fd071f1505852262aac8600e881b5
-
Filesize
473KB
MD57c265c43153e28bffe656b4e39d6eee0
SHA1901371ac02e5d0bc9e815cb016e56bc9c6c16b7a
SHA256bf43df92e6e4a14664ee9ae411f57a41e3155564bd1e1ba82303a1b9b5681fd6
SHA512bcc160f60392425d465990bfef14cb898e004227df62f2cab3b6165830aa22675557dce4cf105f81cb422f358acbacb1818559ea23000ebae7a37c63d1e678aa
-
Filesize
473KB
MD57c265c43153e28bffe656b4e39d6eee0
SHA1901371ac02e5d0bc9e815cb016e56bc9c6c16b7a
SHA256bf43df92e6e4a14664ee9ae411f57a41e3155564bd1e1ba82303a1b9b5681fd6
SHA512bcc160f60392425d465990bfef14cb898e004227df62f2cab3b6165830aa22675557dce4cf105f81cb422f358acbacb1818559ea23000ebae7a37c63d1e678aa
-
Filesize
473KB
MD57c265c43153e28bffe656b4e39d6eee0
SHA1901371ac02e5d0bc9e815cb016e56bc9c6c16b7a
SHA256bf43df92e6e4a14664ee9ae411f57a41e3155564bd1e1ba82303a1b9b5681fd6
SHA512bcc160f60392425d465990bfef14cb898e004227df62f2cab3b6165830aa22675557dce4cf105f81cb422f358acbacb1818559ea23000ebae7a37c63d1e678aa
-
Filesize
769KB
MD5f3b2db45fcda76cc8e7b7e073a5c590d
SHA13fd774e017877e9b3dafdf1ee33f9bdabb58807b
SHA25679c48fd5b19f5d2bcdae8843ed54710b279ae99948c3ff47f192dc4bb8bc57ae
SHA5126cf83d6720aeed8e30a2a0f7a4f1a1e39fbfa11248ac7b2fe63f21f847a78d4a3503e9f77fd4ec069ff4429dd33cb3196fc64be564ced0ecd227fd9b1b989cfe
-
Filesize
769KB
MD5f3b2db45fcda76cc8e7b7e073a5c590d
SHA13fd774e017877e9b3dafdf1ee33f9bdabb58807b
SHA25679c48fd5b19f5d2bcdae8843ed54710b279ae99948c3ff47f192dc4bb8bc57ae
SHA5126cf83d6720aeed8e30a2a0f7a4f1a1e39fbfa11248ac7b2fe63f21f847a78d4a3503e9f77fd4ec069ff4429dd33cb3196fc64be564ced0ecd227fd9b1b989cfe
-
Filesize
598KB
MD5a64ddcbd73e4f21d43b3a372a6a10f4f
SHA1d5537b250d5690e1777d144b5f88950f89591599
SHA2566b90f497e0dfed0928981463974ef20d1dc91656c83390ba70faf4b0793ef6fb
SHA51294e460c1cd1587fcccd5380cc29ec64016271e90e5f7f0bb2254ebdc39c8563dafcca34c45c6ad242072b1ed802c629eb13cec96dbe5585380796a3b2954cab8
-
Filesize
598KB
MD5a64ddcbd73e4f21d43b3a372a6a10f4f
SHA1d5537b250d5690e1777d144b5f88950f89591599
SHA2566b90f497e0dfed0928981463974ef20d1dc91656c83390ba70faf4b0793ef6fb
SHA51294e460c1cd1587fcccd5380cc29ec64016271e90e5f7f0bb2254ebdc39c8563dafcca34c45c6ad242072b1ed802c629eb13cec96dbe5585380796a3b2954cab8
-
Filesize
390KB
MD523e825b68c23f4170d41b2566984cea5
SHA198776eb6b3ffc66fb69620094a0d9d9b33ec0880
SHA256a630ed031d7fd2545de81a9eaafe5b4f502b42a65a4280594bd4d9b626855657
SHA51245e03897d977e289ac459774de1fa28de0f79d86bf20a55e79c160158640c7ce2841b8c363729fccc290a18705127f8f127fd071f1505852262aac8600e881b5
-
Filesize
390KB
MD523e825b68c23f4170d41b2566984cea5
SHA198776eb6b3ffc66fb69620094a0d9d9b33ec0880
SHA256a630ed031d7fd2545de81a9eaafe5b4f502b42a65a4280594bd4d9b626855657
SHA51245e03897d977e289ac459774de1fa28de0f79d86bf20a55e79c160158640c7ce2841b8c363729fccc290a18705127f8f127fd071f1505852262aac8600e881b5
-
Filesize
390KB
MD523e825b68c23f4170d41b2566984cea5
SHA198776eb6b3ffc66fb69620094a0d9d9b33ec0880
SHA256a630ed031d7fd2545de81a9eaafe5b4f502b42a65a4280594bd4d9b626855657
SHA51245e03897d977e289ac459774de1fa28de0f79d86bf20a55e79c160158640c7ce2841b8c363729fccc290a18705127f8f127fd071f1505852262aac8600e881b5
-
Filesize
473KB
MD57c265c43153e28bffe656b4e39d6eee0
SHA1901371ac02e5d0bc9e815cb016e56bc9c6c16b7a
SHA256bf43df92e6e4a14664ee9ae411f57a41e3155564bd1e1ba82303a1b9b5681fd6
SHA512bcc160f60392425d465990bfef14cb898e004227df62f2cab3b6165830aa22675557dce4cf105f81cb422f358acbacb1818559ea23000ebae7a37c63d1e678aa
-
Filesize
473KB
MD57c265c43153e28bffe656b4e39d6eee0
SHA1901371ac02e5d0bc9e815cb016e56bc9c6c16b7a
SHA256bf43df92e6e4a14664ee9ae411f57a41e3155564bd1e1ba82303a1b9b5681fd6
SHA512bcc160f60392425d465990bfef14cb898e004227df62f2cab3b6165830aa22675557dce4cf105f81cb422f358acbacb1818559ea23000ebae7a37c63d1e678aa
-
Filesize
473KB
MD57c265c43153e28bffe656b4e39d6eee0
SHA1901371ac02e5d0bc9e815cb016e56bc9c6c16b7a
SHA256bf43df92e6e4a14664ee9ae411f57a41e3155564bd1e1ba82303a1b9b5681fd6
SHA512bcc160f60392425d465990bfef14cb898e004227df62f2cab3b6165830aa22675557dce4cf105f81cb422f358acbacb1818559ea23000ebae7a37c63d1e678aa