Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 22:26
Static task
static1
Behavioral task
behavioral1
Sample
6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302.exe
Resource
win10v2004-20230220-en
General
-
Target
6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302.exe
-
Size
612KB
-
MD5
5fadd395151a2dc7a6fbdf729438624a
-
SHA1
0bee04c2f712d9380cb5d637140463f0922dc9fa
-
SHA256
6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302
-
SHA512
79ecec33904526fc9d2c6ee17003828bc317dc21a2ce2113dd33cfb80456971dcef78435096229bbe7948ab9803a2b924d1fa8155794c8fd1e2abc6725e409ba
-
SSDEEP
12288:ky900cg5+A8n98FdISCLw2gii6Wdx7w83xb3FLS+kI:kyFci+B9AHQw29Dac8hb6I
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 26289110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 26289110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 26289110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 26289110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 26289110.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 26289110.exe -
Executes dropped EXE 3 IoCs
pid Process 868 st244268.exe 268 26289110.exe 1068 kp242149.exe -
Loads dropped DLL 6 IoCs
pid Process 904 6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302.exe 868 st244268.exe 868 st244268.exe 868 st244268.exe 868 st244268.exe 1068 kp242149.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features 26289110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 26289110.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce st244268.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st244268.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 268 26289110.exe 268 26289110.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 268 26289110.exe Token: SeDebugPrivilege 1068 kp242149.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 904 wrote to memory of 868 904 6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302.exe 27 PID 904 wrote to memory of 868 904 6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302.exe 27 PID 904 wrote to memory of 868 904 6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302.exe 27 PID 904 wrote to memory of 868 904 6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302.exe 27 PID 904 wrote to memory of 868 904 6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302.exe 27 PID 904 wrote to memory of 868 904 6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302.exe 27 PID 904 wrote to memory of 868 904 6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302.exe 27 PID 868 wrote to memory of 268 868 st244268.exe 28 PID 868 wrote to memory of 268 868 st244268.exe 28 PID 868 wrote to memory of 268 868 st244268.exe 28 PID 868 wrote to memory of 268 868 st244268.exe 28 PID 868 wrote to memory of 268 868 st244268.exe 28 PID 868 wrote to memory of 268 868 st244268.exe 28 PID 868 wrote to memory of 268 868 st244268.exe 28 PID 868 wrote to memory of 1068 868 st244268.exe 29 PID 868 wrote to memory of 1068 868 st244268.exe 29 PID 868 wrote to memory of 1068 868 st244268.exe 29 PID 868 wrote to memory of 1068 868 st244268.exe 29 PID 868 wrote to memory of 1068 868 st244268.exe 29 PID 868 wrote to memory of 1068 868 st244268.exe 29 PID 868 wrote to memory of 1068 868 st244268.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302.exe"C:\Users\Admin\AppData\Local\Temp\6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st244268.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st244268.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26289110.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26289110.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:268
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp242149.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp242149.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
458KB
MD567f920374b633a3655589e776b93b030
SHA111854d118b863681e9bcc637266d526e1c69cd5b
SHA2563d47555dc63dddaf1ffb2c3dcd03529e7bf2a3c4c057d66c8e7b267a4756ca28
SHA512f9e90468112c07fa1cbbf307f211c942b2d9e159a32347b3b4a010ffa1efe61ef4ed31298ee0feaae4e92a814f8eef9446acaa1eec5f2855ca660a2b57d1f894
-
Filesize
458KB
MD567f920374b633a3655589e776b93b030
SHA111854d118b863681e9bcc637266d526e1c69cd5b
SHA2563d47555dc63dddaf1ffb2c3dcd03529e7bf2a3c4c057d66c8e7b267a4756ca28
SHA512f9e90468112c07fa1cbbf307f211c942b2d9e159a32347b3b4a010ffa1efe61ef4ed31298ee0feaae4e92a814f8eef9446acaa1eec5f2855ca660a2b57d1f894
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
460KB
MD548743041504b7db5dfeff86d32de1297
SHA15ba0583f1d62ea8afc0f88ac7cb489982314c162
SHA256bf00e3c45fe737c7df71058966df5ac172a748eb7f297906f87e68f6d561cb97
SHA512db8af7eb56dc9591e8f29ce04ea7f07afaf522a320ccd3cc73b0b87ee7f8ce3abe09aaec12dd4ec910e4c8e573cdf96bc7d7aaf48dfba6b5c00cf433eb8e05b3
-
Filesize
460KB
MD548743041504b7db5dfeff86d32de1297
SHA15ba0583f1d62ea8afc0f88ac7cb489982314c162
SHA256bf00e3c45fe737c7df71058966df5ac172a748eb7f297906f87e68f6d561cb97
SHA512db8af7eb56dc9591e8f29ce04ea7f07afaf522a320ccd3cc73b0b87ee7f8ce3abe09aaec12dd4ec910e4c8e573cdf96bc7d7aaf48dfba6b5c00cf433eb8e05b3
-
Filesize
460KB
MD548743041504b7db5dfeff86d32de1297
SHA15ba0583f1d62ea8afc0f88ac7cb489982314c162
SHA256bf00e3c45fe737c7df71058966df5ac172a748eb7f297906f87e68f6d561cb97
SHA512db8af7eb56dc9591e8f29ce04ea7f07afaf522a320ccd3cc73b0b87ee7f8ce3abe09aaec12dd4ec910e4c8e573cdf96bc7d7aaf48dfba6b5c00cf433eb8e05b3
-
Filesize
458KB
MD567f920374b633a3655589e776b93b030
SHA111854d118b863681e9bcc637266d526e1c69cd5b
SHA2563d47555dc63dddaf1ffb2c3dcd03529e7bf2a3c4c057d66c8e7b267a4756ca28
SHA512f9e90468112c07fa1cbbf307f211c942b2d9e159a32347b3b4a010ffa1efe61ef4ed31298ee0feaae4e92a814f8eef9446acaa1eec5f2855ca660a2b57d1f894
-
Filesize
458KB
MD567f920374b633a3655589e776b93b030
SHA111854d118b863681e9bcc637266d526e1c69cd5b
SHA2563d47555dc63dddaf1ffb2c3dcd03529e7bf2a3c4c057d66c8e7b267a4756ca28
SHA512f9e90468112c07fa1cbbf307f211c942b2d9e159a32347b3b4a010ffa1efe61ef4ed31298ee0feaae4e92a814f8eef9446acaa1eec5f2855ca660a2b57d1f894
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
460KB
MD548743041504b7db5dfeff86d32de1297
SHA15ba0583f1d62ea8afc0f88ac7cb489982314c162
SHA256bf00e3c45fe737c7df71058966df5ac172a748eb7f297906f87e68f6d561cb97
SHA512db8af7eb56dc9591e8f29ce04ea7f07afaf522a320ccd3cc73b0b87ee7f8ce3abe09aaec12dd4ec910e4c8e573cdf96bc7d7aaf48dfba6b5c00cf433eb8e05b3
-
Filesize
460KB
MD548743041504b7db5dfeff86d32de1297
SHA15ba0583f1d62ea8afc0f88ac7cb489982314c162
SHA256bf00e3c45fe737c7df71058966df5ac172a748eb7f297906f87e68f6d561cb97
SHA512db8af7eb56dc9591e8f29ce04ea7f07afaf522a320ccd3cc73b0b87ee7f8ce3abe09aaec12dd4ec910e4c8e573cdf96bc7d7aaf48dfba6b5c00cf433eb8e05b3
-
Filesize
460KB
MD548743041504b7db5dfeff86d32de1297
SHA15ba0583f1d62ea8afc0f88ac7cb489982314c162
SHA256bf00e3c45fe737c7df71058966df5ac172a748eb7f297906f87e68f6d561cb97
SHA512db8af7eb56dc9591e8f29ce04ea7f07afaf522a320ccd3cc73b0b87ee7f8ce3abe09aaec12dd4ec910e4c8e573cdf96bc7d7aaf48dfba6b5c00cf433eb8e05b3