Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    193s
  • max time network
    207s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 22:31

General

  • Target

    72609d7db9b41b0c1eb29b131f6e693be189e103a03157ab530ac845e37a20f7.exe

  • Size

    611KB

  • MD5

    204e166c754dda250602c6dbc17180de

  • SHA1

    d073c88b97313982dd7b050b4068517e5db8a067

  • SHA256

    72609d7db9b41b0c1eb29b131f6e693be189e103a03157ab530ac845e37a20f7

  • SHA512

    3739476a8e4ab80f57f38f4f9a35a900bc026b19037e625fc9befafe2373b66ac6f7b3e9afe32dda465aef0d87f012306ed6f8482b7fb59645d6a090a79ffef6

  • SSDEEP

    12288:qy90MSMFAM8KvPs3Gld0aFHEVmxKqgSRUIiWhOJLwX:qy1SMnPPUWwmxfR9icOJMX

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72609d7db9b41b0c1eb29b131f6e693be189e103a03157ab530ac845e37a20f7.exe
    "C:\Users\Admin\AppData\Local\Temp\72609d7db9b41b0c1eb29b131f6e693be189e103a03157ab530ac845e37a20f7.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:928
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st138067.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st138067.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1932
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\35691995.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\35691995.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:588
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp897525.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp897525.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1168

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st138067.exe

    Filesize

    457KB

    MD5

    ca08a3d0bc37bc7aabb9f96a3e25e4c8

    SHA1

    7562d38468422c862b4744d779230104c13cc1c7

    SHA256

    5ecf3e238a013a214665cbe2153f0e59927dbbe1669e6b5e8646c5f5bc60f74d

    SHA512

    2a60f011a3fc5488a8683f33c9037f6008cadef7bdf1ec6a00be37b950da6dfeedc73b39f73fede7eec17716ce5767736b7288c2837f9762dddf0d2ebe20fc60

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st138067.exe

    Filesize

    457KB

    MD5

    ca08a3d0bc37bc7aabb9f96a3e25e4c8

    SHA1

    7562d38468422c862b4744d779230104c13cc1c7

    SHA256

    5ecf3e238a013a214665cbe2153f0e59927dbbe1669e6b5e8646c5f5bc60f74d

    SHA512

    2a60f011a3fc5488a8683f33c9037f6008cadef7bdf1ec6a00be37b950da6dfeedc73b39f73fede7eec17716ce5767736b7288c2837f9762dddf0d2ebe20fc60

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\35691995.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\35691995.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp897525.exe

    Filesize

    459KB

    MD5

    4774971f914ff8114cc38c1ca194a880

    SHA1

    fbbc320551e223858391fbd007b195b0e5a7caa1

    SHA256

    fb3459d9e23b133dfb14673440a0eade25e1eb51d65089503ae68e2f6b80d25f

    SHA512

    7b7b76316b22ca0933757f0cad71987e9bd9de4bd1fa3741159ac49a62a60a67ff68a14fe69ac546dc53ef533783b0ba1c4f8e6ee61bd1207e19b63b29891622

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp897525.exe

    Filesize

    459KB

    MD5

    4774971f914ff8114cc38c1ca194a880

    SHA1

    fbbc320551e223858391fbd007b195b0e5a7caa1

    SHA256

    fb3459d9e23b133dfb14673440a0eade25e1eb51d65089503ae68e2f6b80d25f

    SHA512

    7b7b76316b22ca0933757f0cad71987e9bd9de4bd1fa3741159ac49a62a60a67ff68a14fe69ac546dc53ef533783b0ba1c4f8e6ee61bd1207e19b63b29891622

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp897525.exe

    Filesize

    459KB

    MD5

    4774971f914ff8114cc38c1ca194a880

    SHA1

    fbbc320551e223858391fbd007b195b0e5a7caa1

    SHA256

    fb3459d9e23b133dfb14673440a0eade25e1eb51d65089503ae68e2f6b80d25f

    SHA512

    7b7b76316b22ca0933757f0cad71987e9bd9de4bd1fa3741159ac49a62a60a67ff68a14fe69ac546dc53ef533783b0ba1c4f8e6ee61bd1207e19b63b29891622

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st138067.exe

    Filesize

    457KB

    MD5

    ca08a3d0bc37bc7aabb9f96a3e25e4c8

    SHA1

    7562d38468422c862b4744d779230104c13cc1c7

    SHA256

    5ecf3e238a013a214665cbe2153f0e59927dbbe1669e6b5e8646c5f5bc60f74d

    SHA512

    2a60f011a3fc5488a8683f33c9037f6008cadef7bdf1ec6a00be37b950da6dfeedc73b39f73fede7eec17716ce5767736b7288c2837f9762dddf0d2ebe20fc60

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st138067.exe

    Filesize

    457KB

    MD5

    ca08a3d0bc37bc7aabb9f96a3e25e4c8

    SHA1

    7562d38468422c862b4744d779230104c13cc1c7

    SHA256

    5ecf3e238a013a214665cbe2153f0e59927dbbe1669e6b5e8646c5f5bc60f74d

    SHA512

    2a60f011a3fc5488a8683f33c9037f6008cadef7bdf1ec6a00be37b950da6dfeedc73b39f73fede7eec17716ce5767736b7288c2837f9762dddf0d2ebe20fc60

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\35691995.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp897525.exe

    Filesize

    459KB

    MD5

    4774971f914ff8114cc38c1ca194a880

    SHA1

    fbbc320551e223858391fbd007b195b0e5a7caa1

    SHA256

    fb3459d9e23b133dfb14673440a0eade25e1eb51d65089503ae68e2f6b80d25f

    SHA512

    7b7b76316b22ca0933757f0cad71987e9bd9de4bd1fa3741159ac49a62a60a67ff68a14fe69ac546dc53ef533783b0ba1c4f8e6ee61bd1207e19b63b29891622

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp897525.exe

    Filesize

    459KB

    MD5

    4774971f914ff8114cc38c1ca194a880

    SHA1

    fbbc320551e223858391fbd007b195b0e5a7caa1

    SHA256

    fb3459d9e23b133dfb14673440a0eade25e1eb51d65089503ae68e2f6b80d25f

    SHA512

    7b7b76316b22ca0933757f0cad71987e9bd9de4bd1fa3741159ac49a62a60a67ff68a14fe69ac546dc53ef533783b0ba1c4f8e6ee61bd1207e19b63b29891622

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp897525.exe

    Filesize

    459KB

    MD5

    4774971f914ff8114cc38c1ca194a880

    SHA1

    fbbc320551e223858391fbd007b195b0e5a7caa1

    SHA256

    fb3459d9e23b133dfb14673440a0eade25e1eb51d65089503ae68e2f6b80d25f

    SHA512

    7b7b76316b22ca0933757f0cad71987e9bd9de4bd1fa3741159ac49a62a60a67ff68a14fe69ac546dc53ef533783b0ba1c4f8e6ee61bd1207e19b63b29891622

  • memory/588-72-0x0000000000350000-0x000000000035A000-memory.dmp

    Filesize

    40KB

  • memory/1168-104-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-122-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-85-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-86-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-88-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-90-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-92-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-94-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-96-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-98-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-100-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-102-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-83-0x0000000002470000-0x00000000024AC000-memory.dmp

    Filesize

    240KB

  • memory/1168-106-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-108-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-110-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-112-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-114-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-116-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-118-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-120-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-84-0x0000000002520000-0x000000000255A000-memory.dmp

    Filesize

    232KB

  • memory/1168-124-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-126-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-128-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-130-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-132-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-133-0x00000000001D0000-0x0000000000216000-memory.dmp

    Filesize

    280KB

  • memory/1168-136-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-135-0x0000000004EA0000-0x0000000004EE0000-memory.dmp

    Filesize

    256KB

  • memory/1168-137-0x0000000004EA0000-0x0000000004EE0000-memory.dmp

    Filesize

    256KB

  • memory/1168-139-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-141-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-143-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-145-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-147-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-149-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-151-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/1168-881-0x0000000004EA0000-0x0000000004EE0000-memory.dmp

    Filesize

    256KB

  • memory/1168-882-0x0000000004EA0000-0x0000000004EE0000-memory.dmp

    Filesize

    256KB

  • memory/1168-885-0x0000000004EA0000-0x0000000004EE0000-memory.dmp

    Filesize

    256KB