Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:37
Static task
static1
Behavioral task
behavioral1
Sample
44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe
Resource
win10v2004-20230220-en
General
-
Target
44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe
-
Size
563KB
-
MD5
020f975c44f8fe489ab00ab5f3c6935e
-
SHA1
f5c9e3062fc92237d079d88ef27796b04f2cd2a6
-
SHA256
44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2
-
SHA512
776ec600b9692bbc5baf27d937a23f8adbfafef44db2914da307006a8375593fefcf8fcd7c814de67de742b6cc88e27b11721edd9cdef06c0448e4362288ceee
-
SSDEEP
12288:Hy90P0rXsdmusM7DC5WoGo7w0lGF+pnHcnqL/oQrI07fM13sXGNNP:Hyq2cdbz7DC5GIIF8HrLgQ05L3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 11974718.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 11974718.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 11974718.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 11974718.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 11974718.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 11974718.exe -
Executes dropped EXE 3 IoCs
pid Process 1672 st636958.exe 1104 11974718.exe 664 kp626585.exe -
Loads dropped DLL 6 IoCs
pid Process 1280 44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe 1672 st636958.exe 1672 st636958.exe 1672 st636958.exe 1672 st636958.exe 664 kp626585.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features 11974718.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 11974718.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce st636958.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st636958.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1104 11974718.exe 1104 11974718.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1104 11974718.exe Token: SeDebugPrivilege 664 kp626585.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1280 wrote to memory of 1672 1280 44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe 28 PID 1280 wrote to memory of 1672 1280 44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe 28 PID 1280 wrote to memory of 1672 1280 44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe 28 PID 1280 wrote to memory of 1672 1280 44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe 28 PID 1280 wrote to memory of 1672 1280 44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe 28 PID 1280 wrote to memory of 1672 1280 44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe 28 PID 1280 wrote to memory of 1672 1280 44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe 28 PID 1672 wrote to memory of 1104 1672 st636958.exe 29 PID 1672 wrote to memory of 1104 1672 st636958.exe 29 PID 1672 wrote to memory of 1104 1672 st636958.exe 29 PID 1672 wrote to memory of 1104 1672 st636958.exe 29 PID 1672 wrote to memory of 1104 1672 st636958.exe 29 PID 1672 wrote to memory of 1104 1672 st636958.exe 29 PID 1672 wrote to memory of 1104 1672 st636958.exe 29 PID 1672 wrote to memory of 664 1672 st636958.exe 30 PID 1672 wrote to memory of 664 1672 st636958.exe 30 PID 1672 wrote to memory of 664 1672 st636958.exe 30 PID 1672 wrote to memory of 664 1672 st636958.exe 30 PID 1672 wrote to memory of 664 1672 st636958.exe 30 PID 1672 wrote to memory of 664 1672 st636958.exe 30 PID 1672 wrote to memory of 664 1672 st636958.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe"C:\Users\Admin\AppData\Local\Temp\44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st636958.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st636958.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11974718.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11974718.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp626585.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp626585.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:664
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5a4af458acee4fe87a69942df9a1a91c7
SHA14c9e2954c3b5767499c66a3a7cbe24438a560adb
SHA2565c944cca3cd1e7641d5fde9ad791c4c45d1c456b5b974606dc4b01039a18dc3b
SHA5120c5b398101f3e70b7afa32365f51a289a65f06168bec87e72545c29a158e16022f4ec82a30e434ead7dc89249be73ac2c814f3a67646bf5f448ea7e7974c8de6
-
Filesize
408KB
MD5a4af458acee4fe87a69942df9a1a91c7
SHA14c9e2954c3b5767499c66a3a7cbe24438a560adb
SHA2565c944cca3cd1e7641d5fde9ad791c4c45d1c456b5b974606dc4b01039a18dc3b
SHA5120c5b398101f3e70b7afa32365f51a289a65f06168bec87e72545c29a158e16022f4ec82a30e434ead7dc89249be73ac2c814f3a67646bf5f448ea7e7974c8de6
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
360KB
MD59a96ef9b19f307c7265f06305ce73c65
SHA1c113694419b09817655d1eb078d8ba7ff669727c
SHA256dcbfd05928f34ad6d453d7f636fb22a2416d6b5cd433250f16a0835a64d80a02
SHA512c2bd3c93cc387d10677a58e45f105859706c9a5cb11cbd0a4e7d684ffd0f034af15f65eab141faad03a58111ee9c0ad8cecd0e4dd08d01005dc5878196433688
-
Filesize
360KB
MD59a96ef9b19f307c7265f06305ce73c65
SHA1c113694419b09817655d1eb078d8ba7ff669727c
SHA256dcbfd05928f34ad6d453d7f636fb22a2416d6b5cd433250f16a0835a64d80a02
SHA512c2bd3c93cc387d10677a58e45f105859706c9a5cb11cbd0a4e7d684ffd0f034af15f65eab141faad03a58111ee9c0ad8cecd0e4dd08d01005dc5878196433688
-
Filesize
360KB
MD59a96ef9b19f307c7265f06305ce73c65
SHA1c113694419b09817655d1eb078d8ba7ff669727c
SHA256dcbfd05928f34ad6d453d7f636fb22a2416d6b5cd433250f16a0835a64d80a02
SHA512c2bd3c93cc387d10677a58e45f105859706c9a5cb11cbd0a4e7d684ffd0f034af15f65eab141faad03a58111ee9c0ad8cecd0e4dd08d01005dc5878196433688
-
Filesize
408KB
MD5a4af458acee4fe87a69942df9a1a91c7
SHA14c9e2954c3b5767499c66a3a7cbe24438a560adb
SHA2565c944cca3cd1e7641d5fde9ad791c4c45d1c456b5b974606dc4b01039a18dc3b
SHA5120c5b398101f3e70b7afa32365f51a289a65f06168bec87e72545c29a158e16022f4ec82a30e434ead7dc89249be73ac2c814f3a67646bf5f448ea7e7974c8de6
-
Filesize
408KB
MD5a4af458acee4fe87a69942df9a1a91c7
SHA14c9e2954c3b5767499c66a3a7cbe24438a560adb
SHA2565c944cca3cd1e7641d5fde9ad791c4c45d1c456b5b974606dc4b01039a18dc3b
SHA5120c5b398101f3e70b7afa32365f51a289a65f06168bec87e72545c29a158e16022f4ec82a30e434ead7dc89249be73ac2c814f3a67646bf5f448ea7e7974c8de6
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
360KB
MD59a96ef9b19f307c7265f06305ce73c65
SHA1c113694419b09817655d1eb078d8ba7ff669727c
SHA256dcbfd05928f34ad6d453d7f636fb22a2416d6b5cd433250f16a0835a64d80a02
SHA512c2bd3c93cc387d10677a58e45f105859706c9a5cb11cbd0a4e7d684ffd0f034af15f65eab141faad03a58111ee9c0ad8cecd0e4dd08d01005dc5878196433688
-
Filesize
360KB
MD59a96ef9b19f307c7265f06305ce73c65
SHA1c113694419b09817655d1eb078d8ba7ff669727c
SHA256dcbfd05928f34ad6d453d7f636fb22a2416d6b5cd433250f16a0835a64d80a02
SHA512c2bd3c93cc387d10677a58e45f105859706c9a5cb11cbd0a4e7d684ffd0f034af15f65eab141faad03a58111ee9c0ad8cecd0e4dd08d01005dc5878196433688
-
Filesize
360KB
MD59a96ef9b19f307c7265f06305ce73c65
SHA1c113694419b09817655d1eb078d8ba7ff669727c
SHA256dcbfd05928f34ad6d453d7f636fb22a2416d6b5cd433250f16a0835a64d80a02
SHA512c2bd3c93cc387d10677a58e45f105859706c9a5cb11cbd0a4e7d684ffd0f034af15f65eab141faad03a58111ee9c0ad8cecd0e4dd08d01005dc5878196433688