Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
200s -
max time network
205s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 22:23
Static task
static1
Behavioral task
behavioral1
Sample
6afa50e4ba851f5fc380ff38f3bc40e0a1ffad4a9ef884b6e19eecb0b66911bf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6afa50e4ba851f5fc380ff38f3bc40e0a1ffad4a9ef884b6e19eecb0b66911bf.exe
Resource
win10v2004-20230221-en
General
-
Target
6afa50e4ba851f5fc380ff38f3bc40e0a1ffad4a9ef884b6e19eecb0b66911bf.exe
-
Size
1.1MB
-
MD5
e8a86a61d31c80bea50b9c35a6e0d951
-
SHA1
8a088307c7e947a549196c9b534ececa02b71475
-
SHA256
6afa50e4ba851f5fc380ff38f3bc40e0a1ffad4a9ef884b6e19eecb0b66911bf
-
SHA512
2bbecb1e66e251a8c275e0bf985f0dd0c76bb101fa5df14c43d47b8387b69c469b53bd0ed495d5a3aff3ff4450f16e5875b1251775826ca2da94d35cc042e50d
-
SSDEEP
24576:4y/wmT0mhiuY806jJPAp+CRgKVQV1489E9AJ9ymi://wGXhnYCJPwJgjM89E9AJ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 186071140.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 186071140.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 186071140.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 186071140.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 186071140.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 186071140.exe -
Executes dropped EXE 4 IoCs
pid Process 1636 jg534520.exe 516 NF964145.exe 976 186071140.exe 1596 212864947.exe -
Loads dropped DLL 10 IoCs
pid Process 1632 6afa50e4ba851f5fc380ff38f3bc40e0a1ffad4a9ef884b6e19eecb0b66911bf.exe 1636 jg534520.exe 1636 jg534520.exe 516 NF964145.exe 516 NF964145.exe 516 NF964145.exe 976 186071140.exe 516 NF964145.exe 516 NF964145.exe 1596 212864947.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 186071140.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 186071140.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6afa50e4ba851f5fc380ff38f3bc40e0a1ffad4a9ef884b6e19eecb0b66911bf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6afa50e4ba851f5fc380ff38f3bc40e0a1ffad4a9ef884b6e19eecb0b66911bf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce jg534520.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" jg534520.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce NF964145.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" NF964145.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 976 186071140.exe 976 186071140.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 976 186071140.exe Token: SeDebugPrivilege 1596 212864947.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1636 1632 6afa50e4ba851f5fc380ff38f3bc40e0a1ffad4a9ef884b6e19eecb0b66911bf.exe 28 PID 1632 wrote to memory of 1636 1632 6afa50e4ba851f5fc380ff38f3bc40e0a1ffad4a9ef884b6e19eecb0b66911bf.exe 28 PID 1632 wrote to memory of 1636 1632 6afa50e4ba851f5fc380ff38f3bc40e0a1ffad4a9ef884b6e19eecb0b66911bf.exe 28 PID 1632 wrote to memory of 1636 1632 6afa50e4ba851f5fc380ff38f3bc40e0a1ffad4a9ef884b6e19eecb0b66911bf.exe 28 PID 1632 wrote to memory of 1636 1632 6afa50e4ba851f5fc380ff38f3bc40e0a1ffad4a9ef884b6e19eecb0b66911bf.exe 28 PID 1632 wrote to memory of 1636 1632 6afa50e4ba851f5fc380ff38f3bc40e0a1ffad4a9ef884b6e19eecb0b66911bf.exe 28 PID 1632 wrote to memory of 1636 1632 6afa50e4ba851f5fc380ff38f3bc40e0a1ffad4a9ef884b6e19eecb0b66911bf.exe 28 PID 1636 wrote to memory of 516 1636 jg534520.exe 29 PID 1636 wrote to memory of 516 1636 jg534520.exe 29 PID 1636 wrote to memory of 516 1636 jg534520.exe 29 PID 1636 wrote to memory of 516 1636 jg534520.exe 29 PID 1636 wrote to memory of 516 1636 jg534520.exe 29 PID 1636 wrote to memory of 516 1636 jg534520.exe 29 PID 1636 wrote to memory of 516 1636 jg534520.exe 29 PID 516 wrote to memory of 976 516 NF964145.exe 30 PID 516 wrote to memory of 976 516 NF964145.exe 30 PID 516 wrote to memory of 976 516 NF964145.exe 30 PID 516 wrote to memory of 976 516 NF964145.exe 30 PID 516 wrote to memory of 976 516 NF964145.exe 30 PID 516 wrote to memory of 976 516 NF964145.exe 30 PID 516 wrote to memory of 976 516 NF964145.exe 30 PID 516 wrote to memory of 1596 516 NF964145.exe 31 PID 516 wrote to memory of 1596 516 NF964145.exe 31 PID 516 wrote to memory of 1596 516 NF964145.exe 31 PID 516 wrote to memory of 1596 516 NF964145.exe 31 PID 516 wrote to memory of 1596 516 NF964145.exe 31 PID 516 wrote to memory of 1596 516 NF964145.exe 31 PID 516 wrote to memory of 1596 516 NF964145.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6afa50e4ba851f5fc380ff38f3bc40e0a1ffad4a9ef884b6e19eecb0b66911bf.exe"C:\Users\Admin\AppData\Local\Temp\6afa50e4ba851f5fc380ff38f3bc40e0a1ffad4a9ef884b6e19eecb0b66911bf.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jg534520.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jg534520.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\NF964145.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\NF964145.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\186071140.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\186071140.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:976
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\212864947.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\212864947.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
764KB
MD5ce1699ce802bc23b393c24e636a51762
SHA14307fb8994f1c9769146a134d215ec7954080ef3
SHA25639ce43ee14751ef373bc888b8754db2aa49049dd6cb14548106570c351a2a050
SHA512a5463f847b43e9c5e24a5d396655378d7c0ab214e6659f8bba54f693127426082c54eb810e0b75e0dcb152df09e36d690c7c519d19fd6cf5e689948eb0769a12
-
Filesize
764KB
MD5ce1699ce802bc23b393c24e636a51762
SHA14307fb8994f1c9769146a134d215ec7954080ef3
SHA25639ce43ee14751ef373bc888b8754db2aa49049dd6cb14548106570c351a2a050
SHA512a5463f847b43e9c5e24a5d396655378d7c0ab214e6659f8bba54f693127426082c54eb810e0b75e0dcb152df09e36d690c7c519d19fd6cf5e689948eb0769a12
-
Filesize
592KB
MD52d29f9d3224b387a1d5f5354ba161687
SHA131dc996ccf26661fc0db2b751a8beac368a4b98d
SHA256b2dfdf6757a8314e140d0980a336c0ddf349a1b10e7c98e72b5a47b754705c7a
SHA512be64999182ef53711e090e3f8f788ef2c0c27aa5b33c82c76b4a43840250d4ad0044b467f290c046d4bae70c727af4394bf75fa850d90977d08653ca0a010957
-
Filesize
592KB
MD52d29f9d3224b387a1d5f5354ba161687
SHA131dc996ccf26661fc0db2b751a8beac368a4b98d
SHA256b2dfdf6757a8314e140d0980a336c0ddf349a1b10e7c98e72b5a47b754705c7a
SHA512be64999182ef53711e090e3f8f788ef2c0c27aa5b33c82c76b4a43840250d4ad0044b467f290c046d4bae70c727af4394bf75fa850d90977d08653ca0a010957
-
Filesize
377KB
MD560431a01946a01c11b9a297eac8a75c2
SHA17c5862d45e94a37880a7aa483cdf660378cf4dd7
SHA2566b937893ebc175451cf8ffd1e3fc966dccc592e5951df58c685973aa2c7ef647
SHA5124f9d2a27204a3de6c07cee8ca38ede297a34c3c320b97cf477732bbbdb9ddca028be747e404b9e3d722278991a36ebc45bd7bd47e34719449d9cee3fb43790bc
-
Filesize
377KB
MD560431a01946a01c11b9a297eac8a75c2
SHA17c5862d45e94a37880a7aa483cdf660378cf4dd7
SHA2566b937893ebc175451cf8ffd1e3fc966dccc592e5951df58c685973aa2c7ef647
SHA5124f9d2a27204a3de6c07cee8ca38ede297a34c3c320b97cf477732bbbdb9ddca028be747e404b9e3d722278991a36ebc45bd7bd47e34719449d9cee3fb43790bc
-
Filesize
377KB
MD560431a01946a01c11b9a297eac8a75c2
SHA17c5862d45e94a37880a7aa483cdf660378cf4dd7
SHA2566b937893ebc175451cf8ffd1e3fc966dccc592e5951df58c685973aa2c7ef647
SHA5124f9d2a27204a3de6c07cee8ca38ede297a34c3c320b97cf477732bbbdb9ddca028be747e404b9e3d722278991a36ebc45bd7bd47e34719449d9cee3fb43790bc
-
Filesize
460KB
MD5c00b93abc817e4539603846c8f604e4b
SHA1fb95971e267734f1ff653672fe91ac35f408853e
SHA256366ca24894ad83193b0edfea101bc41859eb2e25ae4b2b418c0241493940531e
SHA512c6ae3ab24dcc4117c61ae30798d1c49049014ccd09dfea3120d16ab4c7f56be300a283fc1bfe65df089e9e25b6ea8e4a4f874e93a13dec0b46b314352a44d1e6
-
Filesize
460KB
MD5c00b93abc817e4539603846c8f604e4b
SHA1fb95971e267734f1ff653672fe91ac35f408853e
SHA256366ca24894ad83193b0edfea101bc41859eb2e25ae4b2b418c0241493940531e
SHA512c6ae3ab24dcc4117c61ae30798d1c49049014ccd09dfea3120d16ab4c7f56be300a283fc1bfe65df089e9e25b6ea8e4a4f874e93a13dec0b46b314352a44d1e6
-
Filesize
460KB
MD5c00b93abc817e4539603846c8f604e4b
SHA1fb95971e267734f1ff653672fe91ac35f408853e
SHA256366ca24894ad83193b0edfea101bc41859eb2e25ae4b2b418c0241493940531e
SHA512c6ae3ab24dcc4117c61ae30798d1c49049014ccd09dfea3120d16ab4c7f56be300a283fc1bfe65df089e9e25b6ea8e4a4f874e93a13dec0b46b314352a44d1e6
-
Filesize
764KB
MD5ce1699ce802bc23b393c24e636a51762
SHA14307fb8994f1c9769146a134d215ec7954080ef3
SHA25639ce43ee14751ef373bc888b8754db2aa49049dd6cb14548106570c351a2a050
SHA512a5463f847b43e9c5e24a5d396655378d7c0ab214e6659f8bba54f693127426082c54eb810e0b75e0dcb152df09e36d690c7c519d19fd6cf5e689948eb0769a12
-
Filesize
764KB
MD5ce1699ce802bc23b393c24e636a51762
SHA14307fb8994f1c9769146a134d215ec7954080ef3
SHA25639ce43ee14751ef373bc888b8754db2aa49049dd6cb14548106570c351a2a050
SHA512a5463f847b43e9c5e24a5d396655378d7c0ab214e6659f8bba54f693127426082c54eb810e0b75e0dcb152df09e36d690c7c519d19fd6cf5e689948eb0769a12
-
Filesize
592KB
MD52d29f9d3224b387a1d5f5354ba161687
SHA131dc996ccf26661fc0db2b751a8beac368a4b98d
SHA256b2dfdf6757a8314e140d0980a336c0ddf349a1b10e7c98e72b5a47b754705c7a
SHA512be64999182ef53711e090e3f8f788ef2c0c27aa5b33c82c76b4a43840250d4ad0044b467f290c046d4bae70c727af4394bf75fa850d90977d08653ca0a010957
-
Filesize
592KB
MD52d29f9d3224b387a1d5f5354ba161687
SHA131dc996ccf26661fc0db2b751a8beac368a4b98d
SHA256b2dfdf6757a8314e140d0980a336c0ddf349a1b10e7c98e72b5a47b754705c7a
SHA512be64999182ef53711e090e3f8f788ef2c0c27aa5b33c82c76b4a43840250d4ad0044b467f290c046d4bae70c727af4394bf75fa850d90977d08653ca0a010957
-
Filesize
377KB
MD560431a01946a01c11b9a297eac8a75c2
SHA17c5862d45e94a37880a7aa483cdf660378cf4dd7
SHA2566b937893ebc175451cf8ffd1e3fc966dccc592e5951df58c685973aa2c7ef647
SHA5124f9d2a27204a3de6c07cee8ca38ede297a34c3c320b97cf477732bbbdb9ddca028be747e404b9e3d722278991a36ebc45bd7bd47e34719449d9cee3fb43790bc
-
Filesize
377KB
MD560431a01946a01c11b9a297eac8a75c2
SHA17c5862d45e94a37880a7aa483cdf660378cf4dd7
SHA2566b937893ebc175451cf8ffd1e3fc966dccc592e5951df58c685973aa2c7ef647
SHA5124f9d2a27204a3de6c07cee8ca38ede297a34c3c320b97cf477732bbbdb9ddca028be747e404b9e3d722278991a36ebc45bd7bd47e34719449d9cee3fb43790bc
-
Filesize
377KB
MD560431a01946a01c11b9a297eac8a75c2
SHA17c5862d45e94a37880a7aa483cdf660378cf4dd7
SHA2566b937893ebc175451cf8ffd1e3fc966dccc592e5951df58c685973aa2c7ef647
SHA5124f9d2a27204a3de6c07cee8ca38ede297a34c3c320b97cf477732bbbdb9ddca028be747e404b9e3d722278991a36ebc45bd7bd47e34719449d9cee3fb43790bc
-
Filesize
460KB
MD5c00b93abc817e4539603846c8f604e4b
SHA1fb95971e267734f1ff653672fe91ac35f408853e
SHA256366ca24894ad83193b0edfea101bc41859eb2e25ae4b2b418c0241493940531e
SHA512c6ae3ab24dcc4117c61ae30798d1c49049014ccd09dfea3120d16ab4c7f56be300a283fc1bfe65df089e9e25b6ea8e4a4f874e93a13dec0b46b314352a44d1e6
-
Filesize
460KB
MD5c00b93abc817e4539603846c8f604e4b
SHA1fb95971e267734f1ff653672fe91ac35f408853e
SHA256366ca24894ad83193b0edfea101bc41859eb2e25ae4b2b418c0241493940531e
SHA512c6ae3ab24dcc4117c61ae30798d1c49049014ccd09dfea3120d16ab4c7f56be300a283fc1bfe65df089e9e25b6ea8e4a4f874e93a13dec0b46b314352a44d1e6
-
Filesize
460KB
MD5c00b93abc817e4539603846c8f604e4b
SHA1fb95971e267734f1ff653672fe91ac35f408853e
SHA256366ca24894ad83193b0edfea101bc41859eb2e25ae4b2b418c0241493940531e
SHA512c6ae3ab24dcc4117c61ae30798d1c49049014ccd09dfea3120d16ab4c7f56be300a283fc1bfe65df089e9e25b6ea8e4a4f874e93a13dec0b46b314352a44d1e6