Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
176s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 22:27
Static task
static1
Behavioral task
behavioral1
Sample
6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf.exe
Resource
win10v2004-20230221-en
General
-
Target
6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf.exe
-
Size
651KB
-
MD5
dedb9dd808d1076385eeebcf2c448704
-
SHA1
ab0d2d3bc5155470da2653a4a52ebc5c13113fc0
-
SHA256
6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf
-
SHA512
dce85db6d8ce735de29551ba17f205093f7efac0717164b2a1b6b81e242b723b9e1a511ff7e8ce0f61e05d6d80921f70191b6816a579080287910dde707972e7
-
SSDEEP
12288:zy90+GJvIpjCxcPIAMnxMDBAolIC4Lb4uZuR9Y6BVXV:zy5oxcPXWMVn4X4uZcyw
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 77678053.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 77678053.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 77678053.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 77678053.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 77678053.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 77678053.exe -
Executes dropped EXE 3 IoCs
pid Process 1824 st083158.exe 1136 77678053.exe 608 kp229108.exe -
Loads dropped DLL 7 IoCs
pid Process 1128 6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf.exe 1824 st083158.exe 1824 st083158.exe 1136 77678053.exe 1824 st083158.exe 1824 st083158.exe 608 kp229108.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 77678053.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 77678053.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce st083158.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st083158.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1136 77678053.exe 1136 77678053.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1136 77678053.exe Token: SeDebugPrivilege 608 kp229108.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1128 wrote to memory of 1824 1128 6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf.exe 28 PID 1128 wrote to memory of 1824 1128 6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf.exe 28 PID 1128 wrote to memory of 1824 1128 6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf.exe 28 PID 1128 wrote to memory of 1824 1128 6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf.exe 28 PID 1128 wrote to memory of 1824 1128 6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf.exe 28 PID 1128 wrote to memory of 1824 1128 6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf.exe 28 PID 1128 wrote to memory of 1824 1128 6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf.exe 28 PID 1824 wrote to memory of 1136 1824 st083158.exe 29 PID 1824 wrote to memory of 1136 1824 st083158.exe 29 PID 1824 wrote to memory of 1136 1824 st083158.exe 29 PID 1824 wrote to memory of 1136 1824 st083158.exe 29 PID 1824 wrote to memory of 1136 1824 st083158.exe 29 PID 1824 wrote to memory of 1136 1824 st083158.exe 29 PID 1824 wrote to memory of 1136 1824 st083158.exe 29 PID 1824 wrote to memory of 608 1824 st083158.exe 30 PID 1824 wrote to memory of 608 1824 st083158.exe 30 PID 1824 wrote to memory of 608 1824 st083158.exe 30 PID 1824 wrote to memory of 608 1824 st083158.exe 30 PID 1824 wrote to memory of 608 1824 st083158.exe 30 PID 1824 wrote to memory of 608 1824 st083158.exe 30 PID 1824 wrote to memory of 608 1824 st083158.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf.exe"C:\Users\Admin\AppData\Local\Temp\6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st083158.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st083158.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77678053.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77678053.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1136
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp229108.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp229108.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:608
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
497KB
MD58031ffc4390d56575105ce74697f4265
SHA1f30d1026bd1c7e02669b2f0a06c9f0a5197bc1f8
SHA256acb39fbc5430834959c711c35cb63b1c18c6f74b80b957d530c5be699a46a3aa
SHA512e2d3f118b84ced29170940c4ab49d917414885ae468a81c0d58d0c249aa7a5e492820f9f7d23b56b7c17b9b208288b0a2f06d433a6948c39d4fdfca460e1e082
-
Filesize
497KB
MD58031ffc4390d56575105ce74697f4265
SHA1f30d1026bd1c7e02669b2f0a06c9f0a5197bc1f8
SHA256acb39fbc5430834959c711c35cb63b1c18c6f74b80b957d530c5be699a46a3aa
SHA512e2d3f118b84ced29170940c4ab49d917414885ae468a81c0d58d0c249aa7a5e492820f9f7d23b56b7c17b9b208288b0a2f06d433a6948c39d4fdfca460e1e082
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
341KB
MD5844870bc9f98bd795947aeb4150039a5
SHA18083aebb9381ae3070750f033ba9f1b2ba327299
SHA2567003c755fb0aa71c7ce38c8429b9b8d29831400c207401a8a5d9500bfde88d2d
SHA512331afc2414c91a7b41deeb4da24c2a8a73f07039cc0d22ab395c596b8646fbb2ec3829c86964c2832e91514f87d80a7b9b434b32b49ca499d01d6acdbd258634
-
Filesize
341KB
MD5844870bc9f98bd795947aeb4150039a5
SHA18083aebb9381ae3070750f033ba9f1b2ba327299
SHA2567003c755fb0aa71c7ce38c8429b9b8d29831400c207401a8a5d9500bfde88d2d
SHA512331afc2414c91a7b41deeb4da24c2a8a73f07039cc0d22ab395c596b8646fbb2ec3829c86964c2832e91514f87d80a7b9b434b32b49ca499d01d6acdbd258634
-
Filesize
341KB
MD5844870bc9f98bd795947aeb4150039a5
SHA18083aebb9381ae3070750f033ba9f1b2ba327299
SHA2567003c755fb0aa71c7ce38c8429b9b8d29831400c207401a8a5d9500bfde88d2d
SHA512331afc2414c91a7b41deeb4da24c2a8a73f07039cc0d22ab395c596b8646fbb2ec3829c86964c2832e91514f87d80a7b9b434b32b49ca499d01d6acdbd258634
-
Filesize
497KB
MD58031ffc4390d56575105ce74697f4265
SHA1f30d1026bd1c7e02669b2f0a06c9f0a5197bc1f8
SHA256acb39fbc5430834959c711c35cb63b1c18c6f74b80b957d530c5be699a46a3aa
SHA512e2d3f118b84ced29170940c4ab49d917414885ae468a81c0d58d0c249aa7a5e492820f9f7d23b56b7c17b9b208288b0a2f06d433a6948c39d4fdfca460e1e082
-
Filesize
497KB
MD58031ffc4390d56575105ce74697f4265
SHA1f30d1026bd1c7e02669b2f0a06c9f0a5197bc1f8
SHA256acb39fbc5430834959c711c35cb63b1c18c6f74b80b957d530c5be699a46a3aa
SHA512e2d3f118b84ced29170940c4ab49d917414885ae468a81c0d58d0c249aa7a5e492820f9f7d23b56b7c17b9b208288b0a2f06d433a6948c39d4fdfca460e1e082
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
341KB
MD5844870bc9f98bd795947aeb4150039a5
SHA18083aebb9381ae3070750f033ba9f1b2ba327299
SHA2567003c755fb0aa71c7ce38c8429b9b8d29831400c207401a8a5d9500bfde88d2d
SHA512331afc2414c91a7b41deeb4da24c2a8a73f07039cc0d22ab395c596b8646fbb2ec3829c86964c2832e91514f87d80a7b9b434b32b49ca499d01d6acdbd258634
-
Filesize
341KB
MD5844870bc9f98bd795947aeb4150039a5
SHA18083aebb9381ae3070750f033ba9f1b2ba327299
SHA2567003c755fb0aa71c7ce38c8429b9b8d29831400c207401a8a5d9500bfde88d2d
SHA512331afc2414c91a7b41deeb4da24c2a8a73f07039cc0d22ab395c596b8646fbb2ec3829c86964c2832e91514f87d80a7b9b434b32b49ca499d01d6acdbd258634
-
Filesize
341KB
MD5844870bc9f98bd795947aeb4150039a5
SHA18083aebb9381ae3070750f033ba9f1b2ba327299
SHA2567003c755fb0aa71c7ce38c8429b9b8d29831400c207401a8a5d9500bfde88d2d
SHA512331afc2414c91a7b41deeb4da24c2a8a73f07039cc0d22ab395c596b8646fbb2ec3829c86964c2832e91514f87d80a7b9b434b32b49ca499d01d6acdbd258634