Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:58
Static task
static1
Behavioral task
behavioral1
Sample
55002c49f5f0b638221f6db9b75f91c5ee916d31b5a91661a03402b27675de7a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
55002c49f5f0b638221f6db9b75f91c5ee916d31b5a91661a03402b27675de7a.exe
Resource
win10v2004-20230220-en
General
-
Target
55002c49f5f0b638221f6db9b75f91c5ee916d31b5a91661a03402b27675de7a.exe
-
Size
1.2MB
-
MD5
4846884c14ded21fe9d4f661335b289e
-
SHA1
190d9c8df6010b6434f447e9ebebe2500a081ef1
-
SHA256
55002c49f5f0b638221f6db9b75f91c5ee916d31b5a91661a03402b27675de7a
-
SHA512
57335c61304e01279dfaed5403c6c3fbd3beed780798b096bda1ccc177ebac21b5591f5277c35500d235e6eb098182713f5ea22578f67c93cd6bd5bc1e80dedf
-
SSDEEP
24576:+Cbht9y/vN4jFVkUI4Hiew2ltipvLt87VLLLVxCwaUdw578ObN/4SYrnP4uO:+Cz9uyy4Hrw2lt2CxxCwbdw57fQSG
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 140109293.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 140109293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 140109293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 140109293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 140109293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 140109293.exe -
Executes dropped EXE 4 IoCs
pid Process 2044 yO446889.exe 1656 qB246406.exe 676 140109293.exe 1684 274081212.exe -
Loads dropped DLL 10 IoCs
pid Process 2040 55002c49f5f0b638221f6db9b75f91c5ee916d31b5a91661a03402b27675de7a.exe 2044 yO446889.exe 2044 yO446889.exe 1656 qB246406.exe 1656 qB246406.exe 1656 qB246406.exe 676 140109293.exe 1656 qB246406.exe 1656 qB246406.exe 1684 274081212.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 140109293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 140109293.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce qB246406.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" qB246406.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 55002c49f5f0b638221f6db9b75f91c5ee916d31b5a91661a03402b27675de7a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 55002c49f5f0b638221f6db9b75f91c5ee916d31b5a91661a03402b27675de7a.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce yO446889.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" yO446889.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 676 140109293.exe 676 140109293.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 676 140109293.exe Token: SeDebugPrivilege 1684 274081212.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2044 2040 55002c49f5f0b638221f6db9b75f91c5ee916d31b5a91661a03402b27675de7a.exe 28 PID 2040 wrote to memory of 2044 2040 55002c49f5f0b638221f6db9b75f91c5ee916d31b5a91661a03402b27675de7a.exe 28 PID 2040 wrote to memory of 2044 2040 55002c49f5f0b638221f6db9b75f91c5ee916d31b5a91661a03402b27675de7a.exe 28 PID 2040 wrote to memory of 2044 2040 55002c49f5f0b638221f6db9b75f91c5ee916d31b5a91661a03402b27675de7a.exe 28 PID 2040 wrote to memory of 2044 2040 55002c49f5f0b638221f6db9b75f91c5ee916d31b5a91661a03402b27675de7a.exe 28 PID 2040 wrote to memory of 2044 2040 55002c49f5f0b638221f6db9b75f91c5ee916d31b5a91661a03402b27675de7a.exe 28 PID 2040 wrote to memory of 2044 2040 55002c49f5f0b638221f6db9b75f91c5ee916d31b5a91661a03402b27675de7a.exe 28 PID 2044 wrote to memory of 1656 2044 yO446889.exe 29 PID 2044 wrote to memory of 1656 2044 yO446889.exe 29 PID 2044 wrote to memory of 1656 2044 yO446889.exe 29 PID 2044 wrote to memory of 1656 2044 yO446889.exe 29 PID 2044 wrote to memory of 1656 2044 yO446889.exe 29 PID 2044 wrote to memory of 1656 2044 yO446889.exe 29 PID 2044 wrote to memory of 1656 2044 yO446889.exe 29 PID 1656 wrote to memory of 676 1656 qB246406.exe 30 PID 1656 wrote to memory of 676 1656 qB246406.exe 30 PID 1656 wrote to memory of 676 1656 qB246406.exe 30 PID 1656 wrote to memory of 676 1656 qB246406.exe 30 PID 1656 wrote to memory of 676 1656 qB246406.exe 30 PID 1656 wrote to memory of 676 1656 qB246406.exe 30 PID 1656 wrote to memory of 676 1656 qB246406.exe 30 PID 1656 wrote to memory of 1684 1656 qB246406.exe 31 PID 1656 wrote to memory of 1684 1656 qB246406.exe 31 PID 1656 wrote to memory of 1684 1656 qB246406.exe 31 PID 1656 wrote to memory of 1684 1656 qB246406.exe 31 PID 1656 wrote to memory of 1684 1656 qB246406.exe 31 PID 1656 wrote to memory of 1684 1656 qB246406.exe 31 PID 1656 wrote to memory of 1684 1656 qB246406.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\55002c49f5f0b638221f6db9b75f91c5ee916d31b5a91661a03402b27675de7a.exe"C:\Users\Admin\AppData\Local\Temp\55002c49f5f0b638221f6db9b75f91c5ee916d31b5a91661a03402b27675de7a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yO446889.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yO446889.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qB246406.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qB246406.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\140109293.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\140109293.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\274081212.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\274081212.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
764KB
MD5600476bf25074113fe6c45c5e40641b7
SHA1b85e680f76ce4fe49940f83231f5a042f5c1ffbb
SHA2563e712a0a91c15a1248bb2379a8319845bd03ac7bbb245652db0d28d78d803852
SHA5123a6476379f08fd67f81095f52b3385872b8abcdba87908bc5260a35ce42289dfcf8e4433796caa80e8c9907e9d4eaedd61709b0d3cd1e513dfcaa4c124111795
-
Filesize
764KB
MD5600476bf25074113fe6c45c5e40641b7
SHA1b85e680f76ce4fe49940f83231f5a042f5c1ffbb
SHA2563e712a0a91c15a1248bb2379a8319845bd03ac7bbb245652db0d28d78d803852
SHA5123a6476379f08fd67f81095f52b3385872b8abcdba87908bc5260a35ce42289dfcf8e4433796caa80e8c9907e9d4eaedd61709b0d3cd1e513dfcaa4c124111795
-
Filesize
592KB
MD53415de0d7184a8e3cf4bbdb8bad1da3f
SHA145ae1c0661ecbf187cc7e81bec3a5c4172d13c85
SHA2564b70ec7176f70274c52058887a5c28f0520b057a38a81e28689aeb33fa7ab756
SHA5127f35d81b4e06777f7b8f9a58686450a7eb74209cde7d002f8ab2882c26ac3f96d3ed9e130db2eb3d166d92f411d9a83983f580c83ea9a4baa4da56a1e27b813c
-
Filesize
592KB
MD53415de0d7184a8e3cf4bbdb8bad1da3f
SHA145ae1c0661ecbf187cc7e81bec3a5c4172d13c85
SHA2564b70ec7176f70274c52058887a5c28f0520b057a38a81e28689aeb33fa7ab756
SHA5127f35d81b4e06777f7b8f9a58686450a7eb74209cde7d002f8ab2882c26ac3f96d3ed9e130db2eb3d166d92f411d9a83983f580c83ea9a4baa4da56a1e27b813c
-
Filesize
377KB
MD54c6f4b1b21c88d4c448735da40062b19
SHA1db46ddbe0e87f3d4564920baa64cbcf36067372f
SHA256454936c08ed3ee121e0f39dec419843247881c016b720eff6258fcae39c7c6ae
SHA5120b790eefe656f6b5a87cf3d41cc86d6cf657988e2c2a74dec6299366e60dea60c2054fbec0676f2bbbb6ded87397e435a2b7194f946400b6737ffb3da300fcb2
-
Filesize
377KB
MD54c6f4b1b21c88d4c448735da40062b19
SHA1db46ddbe0e87f3d4564920baa64cbcf36067372f
SHA256454936c08ed3ee121e0f39dec419843247881c016b720eff6258fcae39c7c6ae
SHA5120b790eefe656f6b5a87cf3d41cc86d6cf657988e2c2a74dec6299366e60dea60c2054fbec0676f2bbbb6ded87397e435a2b7194f946400b6737ffb3da300fcb2
-
Filesize
377KB
MD54c6f4b1b21c88d4c448735da40062b19
SHA1db46ddbe0e87f3d4564920baa64cbcf36067372f
SHA256454936c08ed3ee121e0f39dec419843247881c016b720eff6258fcae39c7c6ae
SHA5120b790eefe656f6b5a87cf3d41cc86d6cf657988e2c2a74dec6299366e60dea60c2054fbec0676f2bbbb6ded87397e435a2b7194f946400b6737ffb3da300fcb2
-
Filesize
459KB
MD51bea2505609a88ba8f010303c0468d45
SHA19d199dd335b22ba2bb2dd70be5b88b1f16e18281
SHA2569e3c72dd1a54b6571d5aa394845613c9e6f75738a56850b930a1f784a049fa1a
SHA51298cc3f474f9b7b266a693646723105a23a8c0e8be0d47ca6b0e5238605778e93371ea35def47ffe049c1c3d6573a21d489ea650ed77c8ea0383515088913fb06
-
Filesize
459KB
MD51bea2505609a88ba8f010303c0468d45
SHA19d199dd335b22ba2bb2dd70be5b88b1f16e18281
SHA2569e3c72dd1a54b6571d5aa394845613c9e6f75738a56850b930a1f784a049fa1a
SHA51298cc3f474f9b7b266a693646723105a23a8c0e8be0d47ca6b0e5238605778e93371ea35def47ffe049c1c3d6573a21d489ea650ed77c8ea0383515088913fb06
-
Filesize
459KB
MD51bea2505609a88ba8f010303c0468d45
SHA19d199dd335b22ba2bb2dd70be5b88b1f16e18281
SHA2569e3c72dd1a54b6571d5aa394845613c9e6f75738a56850b930a1f784a049fa1a
SHA51298cc3f474f9b7b266a693646723105a23a8c0e8be0d47ca6b0e5238605778e93371ea35def47ffe049c1c3d6573a21d489ea650ed77c8ea0383515088913fb06
-
Filesize
764KB
MD5600476bf25074113fe6c45c5e40641b7
SHA1b85e680f76ce4fe49940f83231f5a042f5c1ffbb
SHA2563e712a0a91c15a1248bb2379a8319845bd03ac7bbb245652db0d28d78d803852
SHA5123a6476379f08fd67f81095f52b3385872b8abcdba87908bc5260a35ce42289dfcf8e4433796caa80e8c9907e9d4eaedd61709b0d3cd1e513dfcaa4c124111795
-
Filesize
764KB
MD5600476bf25074113fe6c45c5e40641b7
SHA1b85e680f76ce4fe49940f83231f5a042f5c1ffbb
SHA2563e712a0a91c15a1248bb2379a8319845bd03ac7bbb245652db0d28d78d803852
SHA5123a6476379f08fd67f81095f52b3385872b8abcdba87908bc5260a35ce42289dfcf8e4433796caa80e8c9907e9d4eaedd61709b0d3cd1e513dfcaa4c124111795
-
Filesize
592KB
MD53415de0d7184a8e3cf4bbdb8bad1da3f
SHA145ae1c0661ecbf187cc7e81bec3a5c4172d13c85
SHA2564b70ec7176f70274c52058887a5c28f0520b057a38a81e28689aeb33fa7ab756
SHA5127f35d81b4e06777f7b8f9a58686450a7eb74209cde7d002f8ab2882c26ac3f96d3ed9e130db2eb3d166d92f411d9a83983f580c83ea9a4baa4da56a1e27b813c
-
Filesize
592KB
MD53415de0d7184a8e3cf4bbdb8bad1da3f
SHA145ae1c0661ecbf187cc7e81bec3a5c4172d13c85
SHA2564b70ec7176f70274c52058887a5c28f0520b057a38a81e28689aeb33fa7ab756
SHA5127f35d81b4e06777f7b8f9a58686450a7eb74209cde7d002f8ab2882c26ac3f96d3ed9e130db2eb3d166d92f411d9a83983f580c83ea9a4baa4da56a1e27b813c
-
Filesize
377KB
MD54c6f4b1b21c88d4c448735da40062b19
SHA1db46ddbe0e87f3d4564920baa64cbcf36067372f
SHA256454936c08ed3ee121e0f39dec419843247881c016b720eff6258fcae39c7c6ae
SHA5120b790eefe656f6b5a87cf3d41cc86d6cf657988e2c2a74dec6299366e60dea60c2054fbec0676f2bbbb6ded87397e435a2b7194f946400b6737ffb3da300fcb2
-
Filesize
377KB
MD54c6f4b1b21c88d4c448735da40062b19
SHA1db46ddbe0e87f3d4564920baa64cbcf36067372f
SHA256454936c08ed3ee121e0f39dec419843247881c016b720eff6258fcae39c7c6ae
SHA5120b790eefe656f6b5a87cf3d41cc86d6cf657988e2c2a74dec6299366e60dea60c2054fbec0676f2bbbb6ded87397e435a2b7194f946400b6737ffb3da300fcb2
-
Filesize
377KB
MD54c6f4b1b21c88d4c448735da40062b19
SHA1db46ddbe0e87f3d4564920baa64cbcf36067372f
SHA256454936c08ed3ee121e0f39dec419843247881c016b720eff6258fcae39c7c6ae
SHA5120b790eefe656f6b5a87cf3d41cc86d6cf657988e2c2a74dec6299366e60dea60c2054fbec0676f2bbbb6ded87397e435a2b7194f946400b6737ffb3da300fcb2
-
Filesize
459KB
MD51bea2505609a88ba8f010303c0468d45
SHA19d199dd335b22ba2bb2dd70be5b88b1f16e18281
SHA2569e3c72dd1a54b6571d5aa394845613c9e6f75738a56850b930a1f784a049fa1a
SHA51298cc3f474f9b7b266a693646723105a23a8c0e8be0d47ca6b0e5238605778e93371ea35def47ffe049c1c3d6573a21d489ea650ed77c8ea0383515088913fb06
-
Filesize
459KB
MD51bea2505609a88ba8f010303c0468d45
SHA19d199dd335b22ba2bb2dd70be5b88b1f16e18281
SHA2569e3c72dd1a54b6571d5aa394845613c9e6f75738a56850b930a1f784a049fa1a
SHA51298cc3f474f9b7b266a693646723105a23a8c0e8be0d47ca6b0e5238605778e93371ea35def47ffe049c1c3d6573a21d489ea650ed77c8ea0383515088913fb06
-
Filesize
459KB
MD51bea2505609a88ba8f010303c0468d45
SHA19d199dd335b22ba2bb2dd70be5b88b1f16e18281
SHA2569e3c72dd1a54b6571d5aa394845613c9e6f75738a56850b930a1f784a049fa1a
SHA51298cc3f474f9b7b266a693646723105a23a8c0e8be0d47ca6b0e5238605778e93371ea35def47ffe049c1c3d6573a21d489ea650ed77c8ea0383515088913fb06