Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
180s -
max time network
186s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 22:03
Static task
static1
Behavioral task
behavioral1
Sample
58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe
Resource
win10v2004-20230220-en
General
-
Target
58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe
-
Size
752KB
-
MD5
99ee8afa485537280607d20dbe139f07
-
SHA1
e6e877476de2da086546655d6b06da1f2a3205ec
-
SHA256
58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c
-
SHA512
f0d6ac8eb367a96fc8dab00532a27251ffbbe48973714afbf2b0b11b9446550a524785f25d77a0ef65baf37c7691e3610d378674e8988f1d52c204c8e5118dd6
-
SSDEEP
12288:ky90VBiOEoLrsPGyoXlyltkcS3Y/pZBxdlHFWJ6V+Zr:kymiO5LrsPAX0ltklo/vzfHuCSr
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 77577788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 77577788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 77577788.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 77577788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 77577788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 77577788.exe -
Executes dropped EXE 3 IoCs
pid Process 1048 un104011.exe 684 77577788.exe 1744 rk783733.exe -
Loads dropped DLL 8 IoCs
pid Process 1244 58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe 1048 un104011.exe 1048 un104011.exe 1048 un104011.exe 684 77577788.exe 1048 un104011.exe 1048 un104011.exe 1744 rk783733.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 77577788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 77577788.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un104011.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un104011.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 684 77577788.exe 684 77577788.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 684 77577788.exe Token: SeDebugPrivilege 1744 rk783733.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1244 wrote to memory of 1048 1244 58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe 28 PID 1244 wrote to memory of 1048 1244 58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe 28 PID 1244 wrote to memory of 1048 1244 58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe 28 PID 1244 wrote to memory of 1048 1244 58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe 28 PID 1244 wrote to memory of 1048 1244 58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe 28 PID 1244 wrote to memory of 1048 1244 58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe 28 PID 1244 wrote to memory of 1048 1244 58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe 28 PID 1048 wrote to memory of 684 1048 un104011.exe 29 PID 1048 wrote to memory of 684 1048 un104011.exe 29 PID 1048 wrote to memory of 684 1048 un104011.exe 29 PID 1048 wrote to memory of 684 1048 un104011.exe 29 PID 1048 wrote to memory of 684 1048 un104011.exe 29 PID 1048 wrote to memory of 684 1048 un104011.exe 29 PID 1048 wrote to memory of 684 1048 un104011.exe 29 PID 1048 wrote to memory of 1744 1048 un104011.exe 30 PID 1048 wrote to memory of 1744 1048 un104011.exe 30 PID 1048 wrote to memory of 1744 1048 un104011.exe 30 PID 1048 wrote to memory of 1744 1048 un104011.exe 30 PID 1048 wrote to memory of 1744 1048 un104011.exe 30 PID 1048 wrote to memory of 1744 1048 un104011.exe 30 PID 1048 wrote to memory of 1744 1048 un104011.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe"C:\Users\Admin\AppData\Local\Temp\58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un104011.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un104011.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77577788.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77577788.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:684
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk783733.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk783733.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD53b660b062091c65f92e7a3f3088d203d
SHA17c1632312de2e76b12fa0232935486c68daf6804
SHA25612095af73ea12641a302194f22e201127fa147f60c74ce66f07f87265f6663ea
SHA512313ba7143561c2d1eb87707aceb1282e5f0f08af354439759011b40d06c95c980df994f611052a24722242f4696acea530b5fd09ee88979a94bea9f62bab27dc
-
Filesize
598KB
MD53b660b062091c65f92e7a3f3088d203d
SHA17c1632312de2e76b12fa0232935486c68daf6804
SHA25612095af73ea12641a302194f22e201127fa147f60c74ce66f07f87265f6663ea
SHA512313ba7143561c2d1eb87707aceb1282e5f0f08af354439759011b40d06c95c980df994f611052a24722242f4696acea530b5fd09ee88979a94bea9f62bab27dc
-
Filesize
390KB
MD55804d95dbe128f91f5f37bf89913ed0f
SHA190f3fe3948eeb0ca112ea4f31f2aabec64a02ea8
SHA256eed20595a049ed2ba4e120e8c86926f9240f2623e4416dcade1909dbee0c2a69
SHA512c5a9b2d6f4ad2530e6fd8f64474acd1b7ee4b0bf32f4dedc7e2cee1cb1101b1eecdd8e353f4eb3cc397a5876614ae7d21f49eade20bf3c10aa7e48b38edd7297
-
Filesize
390KB
MD55804d95dbe128f91f5f37bf89913ed0f
SHA190f3fe3948eeb0ca112ea4f31f2aabec64a02ea8
SHA256eed20595a049ed2ba4e120e8c86926f9240f2623e4416dcade1909dbee0c2a69
SHA512c5a9b2d6f4ad2530e6fd8f64474acd1b7ee4b0bf32f4dedc7e2cee1cb1101b1eecdd8e353f4eb3cc397a5876614ae7d21f49eade20bf3c10aa7e48b38edd7297
-
Filesize
390KB
MD55804d95dbe128f91f5f37bf89913ed0f
SHA190f3fe3948eeb0ca112ea4f31f2aabec64a02ea8
SHA256eed20595a049ed2ba4e120e8c86926f9240f2623e4416dcade1909dbee0c2a69
SHA512c5a9b2d6f4ad2530e6fd8f64474acd1b7ee4b0bf32f4dedc7e2cee1cb1101b1eecdd8e353f4eb3cc397a5876614ae7d21f49eade20bf3c10aa7e48b38edd7297
-
Filesize
473KB
MD5a891d85065206f2d71f7df8d8ee5d3ff
SHA19b331a4675df72eb3f78bd59d20b6f8e2ce32161
SHA2560330d1c7cc9c516cdbd99658c4e451a95a3c286dafaf29c89ac442c5e4500d7e
SHA5128e9bbd69e39bbd28fb93395e425245decc666f3f003cb527cb551267b8cb09f01d97d1bb4f4df0b83691cd3b91b961f55a6e231e55f0cce323968c450b27a594
-
Filesize
473KB
MD5a891d85065206f2d71f7df8d8ee5d3ff
SHA19b331a4675df72eb3f78bd59d20b6f8e2ce32161
SHA2560330d1c7cc9c516cdbd99658c4e451a95a3c286dafaf29c89ac442c5e4500d7e
SHA5128e9bbd69e39bbd28fb93395e425245decc666f3f003cb527cb551267b8cb09f01d97d1bb4f4df0b83691cd3b91b961f55a6e231e55f0cce323968c450b27a594
-
Filesize
473KB
MD5a891d85065206f2d71f7df8d8ee5d3ff
SHA19b331a4675df72eb3f78bd59d20b6f8e2ce32161
SHA2560330d1c7cc9c516cdbd99658c4e451a95a3c286dafaf29c89ac442c5e4500d7e
SHA5128e9bbd69e39bbd28fb93395e425245decc666f3f003cb527cb551267b8cb09f01d97d1bb4f4df0b83691cd3b91b961f55a6e231e55f0cce323968c450b27a594
-
Filesize
598KB
MD53b660b062091c65f92e7a3f3088d203d
SHA17c1632312de2e76b12fa0232935486c68daf6804
SHA25612095af73ea12641a302194f22e201127fa147f60c74ce66f07f87265f6663ea
SHA512313ba7143561c2d1eb87707aceb1282e5f0f08af354439759011b40d06c95c980df994f611052a24722242f4696acea530b5fd09ee88979a94bea9f62bab27dc
-
Filesize
598KB
MD53b660b062091c65f92e7a3f3088d203d
SHA17c1632312de2e76b12fa0232935486c68daf6804
SHA25612095af73ea12641a302194f22e201127fa147f60c74ce66f07f87265f6663ea
SHA512313ba7143561c2d1eb87707aceb1282e5f0f08af354439759011b40d06c95c980df994f611052a24722242f4696acea530b5fd09ee88979a94bea9f62bab27dc
-
Filesize
390KB
MD55804d95dbe128f91f5f37bf89913ed0f
SHA190f3fe3948eeb0ca112ea4f31f2aabec64a02ea8
SHA256eed20595a049ed2ba4e120e8c86926f9240f2623e4416dcade1909dbee0c2a69
SHA512c5a9b2d6f4ad2530e6fd8f64474acd1b7ee4b0bf32f4dedc7e2cee1cb1101b1eecdd8e353f4eb3cc397a5876614ae7d21f49eade20bf3c10aa7e48b38edd7297
-
Filesize
390KB
MD55804d95dbe128f91f5f37bf89913ed0f
SHA190f3fe3948eeb0ca112ea4f31f2aabec64a02ea8
SHA256eed20595a049ed2ba4e120e8c86926f9240f2623e4416dcade1909dbee0c2a69
SHA512c5a9b2d6f4ad2530e6fd8f64474acd1b7ee4b0bf32f4dedc7e2cee1cb1101b1eecdd8e353f4eb3cc397a5876614ae7d21f49eade20bf3c10aa7e48b38edd7297
-
Filesize
390KB
MD55804d95dbe128f91f5f37bf89913ed0f
SHA190f3fe3948eeb0ca112ea4f31f2aabec64a02ea8
SHA256eed20595a049ed2ba4e120e8c86926f9240f2623e4416dcade1909dbee0c2a69
SHA512c5a9b2d6f4ad2530e6fd8f64474acd1b7ee4b0bf32f4dedc7e2cee1cb1101b1eecdd8e353f4eb3cc397a5876614ae7d21f49eade20bf3c10aa7e48b38edd7297
-
Filesize
473KB
MD5a891d85065206f2d71f7df8d8ee5d3ff
SHA19b331a4675df72eb3f78bd59d20b6f8e2ce32161
SHA2560330d1c7cc9c516cdbd99658c4e451a95a3c286dafaf29c89ac442c5e4500d7e
SHA5128e9bbd69e39bbd28fb93395e425245decc666f3f003cb527cb551267b8cb09f01d97d1bb4f4df0b83691cd3b91b961f55a6e231e55f0cce323968c450b27a594
-
Filesize
473KB
MD5a891d85065206f2d71f7df8d8ee5d3ff
SHA19b331a4675df72eb3f78bd59d20b6f8e2ce32161
SHA2560330d1c7cc9c516cdbd99658c4e451a95a3c286dafaf29c89ac442c5e4500d7e
SHA5128e9bbd69e39bbd28fb93395e425245decc666f3f003cb527cb551267b8cb09f01d97d1bb4f4df0b83691cd3b91b961f55a6e231e55f0cce323968c450b27a594
-
Filesize
473KB
MD5a891d85065206f2d71f7df8d8ee5d3ff
SHA19b331a4675df72eb3f78bd59d20b6f8e2ce32161
SHA2560330d1c7cc9c516cdbd99658c4e451a95a3c286dafaf29c89ac442c5e4500d7e
SHA5128e9bbd69e39bbd28fb93395e425245decc666f3f003cb527cb551267b8cb09f01d97d1bb4f4df0b83691cd3b91b961f55a6e231e55f0cce323968c450b27a594