Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    180s
  • max time network
    186s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 22:03

General

  • Target

    58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe

  • Size

    752KB

  • MD5

    99ee8afa485537280607d20dbe139f07

  • SHA1

    e6e877476de2da086546655d6b06da1f2a3205ec

  • SHA256

    58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c

  • SHA512

    f0d6ac8eb367a96fc8dab00532a27251ffbbe48973714afbf2b0b11b9446550a524785f25d77a0ef65baf37c7691e3610d378674e8988f1d52c204c8e5118dd6

  • SSDEEP

    12288:ky90VBiOEoLrsPGyoXlyltkcS3Y/pZBxdlHFWJ6V+Zr:kymiO5LrsPAX0ltklo/vzfHuCSr

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe
    "C:\Users\Admin\AppData\Local\Temp\58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un104011.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un104011.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1048
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77577788.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77577788.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk783733.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk783733.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1744

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un104011.exe

    Filesize

    598KB

    MD5

    3b660b062091c65f92e7a3f3088d203d

    SHA1

    7c1632312de2e76b12fa0232935486c68daf6804

    SHA256

    12095af73ea12641a302194f22e201127fa147f60c74ce66f07f87265f6663ea

    SHA512

    313ba7143561c2d1eb87707aceb1282e5f0f08af354439759011b40d06c95c980df994f611052a24722242f4696acea530b5fd09ee88979a94bea9f62bab27dc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un104011.exe

    Filesize

    598KB

    MD5

    3b660b062091c65f92e7a3f3088d203d

    SHA1

    7c1632312de2e76b12fa0232935486c68daf6804

    SHA256

    12095af73ea12641a302194f22e201127fa147f60c74ce66f07f87265f6663ea

    SHA512

    313ba7143561c2d1eb87707aceb1282e5f0f08af354439759011b40d06c95c980df994f611052a24722242f4696acea530b5fd09ee88979a94bea9f62bab27dc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77577788.exe

    Filesize

    390KB

    MD5

    5804d95dbe128f91f5f37bf89913ed0f

    SHA1

    90f3fe3948eeb0ca112ea4f31f2aabec64a02ea8

    SHA256

    eed20595a049ed2ba4e120e8c86926f9240f2623e4416dcade1909dbee0c2a69

    SHA512

    c5a9b2d6f4ad2530e6fd8f64474acd1b7ee4b0bf32f4dedc7e2cee1cb1101b1eecdd8e353f4eb3cc397a5876614ae7d21f49eade20bf3c10aa7e48b38edd7297

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77577788.exe

    Filesize

    390KB

    MD5

    5804d95dbe128f91f5f37bf89913ed0f

    SHA1

    90f3fe3948eeb0ca112ea4f31f2aabec64a02ea8

    SHA256

    eed20595a049ed2ba4e120e8c86926f9240f2623e4416dcade1909dbee0c2a69

    SHA512

    c5a9b2d6f4ad2530e6fd8f64474acd1b7ee4b0bf32f4dedc7e2cee1cb1101b1eecdd8e353f4eb3cc397a5876614ae7d21f49eade20bf3c10aa7e48b38edd7297

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77577788.exe

    Filesize

    390KB

    MD5

    5804d95dbe128f91f5f37bf89913ed0f

    SHA1

    90f3fe3948eeb0ca112ea4f31f2aabec64a02ea8

    SHA256

    eed20595a049ed2ba4e120e8c86926f9240f2623e4416dcade1909dbee0c2a69

    SHA512

    c5a9b2d6f4ad2530e6fd8f64474acd1b7ee4b0bf32f4dedc7e2cee1cb1101b1eecdd8e353f4eb3cc397a5876614ae7d21f49eade20bf3c10aa7e48b38edd7297

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk783733.exe

    Filesize

    473KB

    MD5

    a891d85065206f2d71f7df8d8ee5d3ff

    SHA1

    9b331a4675df72eb3f78bd59d20b6f8e2ce32161

    SHA256

    0330d1c7cc9c516cdbd99658c4e451a95a3c286dafaf29c89ac442c5e4500d7e

    SHA512

    8e9bbd69e39bbd28fb93395e425245decc666f3f003cb527cb551267b8cb09f01d97d1bb4f4df0b83691cd3b91b961f55a6e231e55f0cce323968c450b27a594

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk783733.exe

    Filesize

    473KB

    MD5

    a891d85065206f2d71f7df8d8ee5d3ff

    SHA1

    9b331a4675df72eb3f78bd59d20b6f8e2ce32161

    SHA256

    0330d1c7cc9c516cdbd99658c4e451a95a3c286dafaf29c89ac442c5e4500d7e

    SHA512

    8e9bbd69e39bbd28fb93395e425245decc666f3f003cb527cb551267b8cb09f01d97d1bb4f4df0b83691cd3b91b961f55a6e231e55f0cce323968c450b27a594

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk783733.exe

    Filesize

    473KB

    MD5

    a891d85065206f2d71f7df8d8ee5d3ff

    SHA1

    9b331a4675df72eb3f78bd59d20b6f8e2ce32161

    SHA256

    0330d1c7cc9c516cdbd99658c4e451a95a3c286dafaf29c89ac442c5e4500d7e

    SHA512

    8e9bbd69e39bbd28fb93395e425245decc666f3f003cb527cb551267b8cb09f01d97d1bb4f4df0b83691cd3b91b961f55a6e231e55f0cce323968c450b27a594

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un104011.exe

    Filesize

    598KB

    MD5

    3b660b062091c65f92e7a3f3088d203d

    SHA1

    7c1632312de2e76b12fa0232935486c68daf6804

    SHA256

    12095af73ea12641a302194f22e201127fa147f60c74ce66f07f87265f6663ea

    SHA512

    313ba7143561c2d1eb87707aceb1282e5f0f08af354439759011b40d06c95c980df994f611052a24722242f4696acea530b5fd09ee88979a94bea9f62bab27dc

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un104011.exe

    Filesize

    598KB

    MD5

    3b660b062091c65f92e7a3f3088d203d

    SHA1

    7c1632312de2e76b12fa0232935486c68daf6804

    SHA256

    12095af73ea12641a302194f22e201127fa147f60c74ce66f07f87265f6663ea

    SHA512

    313ba7143561c2d1eb87707aceb1282e5f0f08af354439759011b40d06c95c980df994f611052a24722242f4696acea530b5fd09ee88979a94bea9f62bab27dc

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\77577788.exe

    Filesize

    390KB

    MD5

    5804d95dbe128f91f5f37bf89913ed0f

    SHA1

    90f3fe3948eeb0ca112ea4f31f2aabec64a02ea8

    SHA256

    eed20595a049ed2ba4e120e8c86926f9240f2623e4416dcade1909dbee0c2a69

    SHA512

    c5a9b2d6f4ad2530e6fd8f64474acd1b7ee4b0bf32f4dedc7e2cee1cb1101b1eecdd8e353f4eb3cc397a5876614ae7d21f49eade20bf3c10aa7e48b38edd7297

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\77577788.exe

    Filesize

    390KB

    MD5

    5804d95dbe128f91f5f37bf89913ed0f

    SHA1

    90f3fe3948eeb0ca112ea4f31f2aabec64a02ea8

    SHA256

    eed20595a049ed2ba4e120e8c86926f9240f2623e4416dcade1909dbee0c2a69

    SHA512

    c5a9b2d6f4ad2530e6fd8f64474acd1b7ee4b0bf32f4dedc7e2cee1cb1101b1eecdd8e353f4eb3cc397a5876614ae7d21f49eade20bf3c10aa7e48b38edd7297

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\77577788.exe

    Filesize

    390KB

    MD5

    5804d95dbe128f91f5f37bf89913ed0f

    SHA1

    90f3fe3948eeb0ca112ea4f31f2aabec64a02ea8

    SHA256

    eed20595a049ed2ba4e120e8c86926f9240f2623e4416dcade1909dbee0c2a69

    SHA512

    c5a9b2d6f4ad2530e6fd8f64474acd1b7ee4b0bf32f4dedc7e2cee1cb1101b1eecdd8e353f4eb3cc397a5876614ae7d21f49eade20bf3c10aa7e48b38edd7297

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk783733.exe

    Filesize

    473KB

    MD5

    a891d85065206f2d71f7df8d8ee5d3ff

    SHA1

    9b331a4675df72eb3f78bd59d20b6f8e2ce32161

    SHA256

    0330d1c7cc9c516cdbd99658c4e451a95a3c286dafaf29c89ac442c5e4500d7e

    SHA512

    8e9bbd69e39bbd28fb93395e425245decc666f3f003cb527cb551267b8cb09f01d97d1bb4f4df0b83691cd3b91b961f55a6e231e55f0cce323968c450b27a594

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk783733.exe

    Filesize

    473KB

    MD5

    a891d85065206f2d71f7df8d8ee5d3ff

    SHA1

    9b331a4675df72eb3f78bd59d20b6f8e2ce32161

    SHA256

    0330d1c7cc9c516cdbd99658c4e451a95a3c286dafaf29c89ac442c5e4500d7e

    SHA512

    8e9bbd69e39bbd28fb93395e425245decc666f3f003cb527cb551267b8cb09f01d97d1bb4f4df0b83691cd3b91b961f55a6e231e55f0cce323968c450b27a594

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk783733.exe

    Filesize

    473KB

    MD5

    a891d85065206f2d71f7df8d8ee5d3ff

    SHA1

    9b331a4675df72eb3f78bd59d20b6f8e2ce32161

    SHA256

    0330d1c7cc9c516cdbd99658c4e451a95a3c286dafaf29c89ac442c5e4500d7e

    SHA512

    8e9bbd69e39bbd28fb93395e425245decc666f3f003cb527cb551267b8cb09f01d97d1bb4f4df0b83691cd3b91b961f55a6e231e55f0cce323968c450b27a594

  • memory/684-87-0x00000000008C0000-0x00000000008D2000-memory.dmp

    Filesize

    72KB

  • memory/684-91-0x00000000008C0000-0x00000000008D2000-memory.dmp

    Filesize

    72KB

  • memory/684-89-0x00000000008C0000-0x00000000008D2000-memory.dmp

    Filesize

    72KB

  • memory/684-94-0x0000000000290000-0x00000000002BD000-memory.dmp

    Filesize

    180KB

  • memory/684-98-0x0000000004DA0000-0x0000000004DE0000-memory.dmp

    Filesize

    256KB

  • memory/684-97-0x00000000008C0000-0x00000000008D2000-memory.dmp

    Filesize

    72KB

  • memory/684-96-0x0000000004DA0000-0x0000000004DE0000-memory.dmp

    Filesize

    256KB

  • memory/684-93-0x00000000008C0000-0x00000000008D2000-memory.dmp

    Filesize

    72KB

  • memory/684-100-0x00000000008C0000-0x00000000008D2000-memory.dmp

    Filesize

    72KB

  • memory/684-104-0x00000000008C0000-0x00000000008D2000-memory.dmp

    Filesize

    72KB

  • memory/684-102-0x00000000008C0000-0x00000000008D2000-memory.dmp

    Filesize

    72KB

  • memory/684-108-0x00000000008C0000-0x00000000008D2000-memory.dmp

    Filesize

    72KB

  • memory/684-106-0x00000000008C0000-0x00000000008D2000-memory.dmp

    Filesize

    72KB

  • memory/684-110-0x00000000008C0000-0x00000000008D2000-memory.dmp

    Filesize

    72KB

  • memory/684-111-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/684-112-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/684-85-0x00000000008C0000-0x00000000008D2000-memory.dmp

    Filesize

    72KB

  • memory/684-83-0x00000000008C0000-0x00000000008D2000-memory.dmp

    Filesize

    72KB

  • memory/684-81-0x00000000008C0000-0x00000000008D2000-memory.dmp

    Filesize

    72KB

  • memory/684-80-0x00000000008C0000-0x00000000008D2000-memory.dmp

    Filesize

    72KB

  • memory/684-79-0x00000000008C0000-0x00000000008D8000-memory.dmp

    Filesize

    96KB

  • memory/684-78-0x00000000003C0000-0x00000000003DA000-memory.dmp

    Filesize

    104KB

  • memory/1744-124-0x0000000000F40000-0x0000000000F7A000-memory.dmp

    Filesize

    232KB

  • memory/1744-146-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/1744-125-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/1744-126-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/1744-128-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/1744-132-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/1744-134-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/1744-130-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/1744-136-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/1744-138-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/1744-140-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/1744-142-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/1744-144-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/1744-123-0x0000000000F00000-0x0000000000F3C000-memory.dmp

    Filesize

    240KB

  • memory/1744-148-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/1744-150-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/1744-154-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/1744-152-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/1744-156-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/1744-158-0x0000000000F40000-0x0000000000F75000-memory.dmp

    Filesize

    212KB

  • memory/1744-548-0x0000000000240000-0x0000000000286000-memory.dmp

    Filesize

    280KB

  • memory/1744-550-0x0000000004F20000-0x0000000004F60000-memory.dmp

    Filesize

    256KB

  • memory/1744-552-0x0000000004F20000-0x0000000004F60000-memory.dmp

    Filesize

    256KB

  • memory/1744-920-0x0000000004F20000-0x0000000004F60000-memory.dmp

    Filesize

    256KB

  • memory/1744-922-0x0000000004F20000-0x0000000004F60000-memory.dmp

    Filesize

    256KB

  • memory/1744-924-0x0000000004F20000-0x0000000004F60000-memory.dmp

    Filesize

    256KB