Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
270s -
max time network
357s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 20:15
Static task
static1
Behavioral task
behavioral1
Sample
0518480d89c957941220c32275188b433c68a87788fc9fba42895398700090ed.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0518480d89c957941220c32275188b433c68a87788fc9fba42895398700090ed.exe
Resource
win10v2004-20230221-en
General
-
Target
0518480d89c957941220c32275188b433c68a87788fc9fba42895398700090ed.exe
-
Size
694KB
-
MD5
a6a88659855946657f11a724c1d36128
-
SHA1
2ad6b7402e6d324acaa50ed6b6ebcd0efc499126
-
SHA256
0518480d89c957941220c32275188b433c68a87788fc9fba42895398700090ed
-
SHA512
65e2c7334755e52cea99626c8346cafcaae1690c1af3c736620b0557786dd8f943cb0b62ff0c8db9f7b0c1e7b58cae907fd62b40e59b41ed0a889885a47e19f7
-
SSDEEP
12288:Cy902m+4wnZmeG6i49M9Wbm89WpmerEQdhPyjY5VN+7Q/MA2Wzs+nGrX:CyiCZBGh4uPoeDHKUN+7QT2AqrX
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 36312146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 36312146.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 36312146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 36312146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 36312146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 36312146.exe -
Executes dropped EXE 2 IoCs
pid Process 1824 un886271.exe 2296 36312146.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 36312146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 36312146.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0518480d89c957941220c32275188b433c68a87788fc9fba42895398700090ed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0518480d89c957941220c32275188b433c68a87788fc9fba42895398700090ed.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un886271.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un886271.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2260 2296 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2296 36312146.exe 2296 36312146.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2296 36312146.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2060 wrote to memory of 1824 2060 0518480d89c957941220c32275188b433c68a87788fc9fba42895398700090ed.exe 80 PID 2060 wrote to memory of 1824 2060 0518480d89c957941220c32275188b433c68a87788fc9fba42895398700090ed.exe 80 PID 2060 wrote to memory of 1824 2060 0518480d89c957941220c32275188b433c68a87788fc9fba42895398700090ed.exe 80 PID 1824 wrote to memory of 2296 1824 un886271.exe 81 PID 1824 wrote to memory of 2296 1824 un886271.exe 81 PID 1824 wrote to memory of 2296 1824 un886271.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\0518480d89c957941220c32275188b433c68a87788fc9fba42895398700090ed.exe"C:\Users\Admin\AppData\Local\Temp\0518480d89c957941220c32275188b433c68a87788fc9fba42895398700090ed.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un886271.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un886271.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\36312146.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\36312146.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 10964⤵
- Program crash
PID:2260
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2296 -ip 22961⤵PID:4988
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541KB
MD56596b3b9f5928d9a5332be4b4c660756
SHA1281e06c367e03b45e4dcc89911882baa2ba14650
SHA256077ed4d88a1bf54956a0581434b7578f8169574e33cf30b06f48374f69f545a8
SHA512a3e4f9985fba41e64e525aa78cdacbc99ea0fac814a86bbe469e41fb1211755c1771993631eee0aeb1a6e5bc9c1e1b4e3f8539bdb237a18e34dd09643c59a5fe
-
Filesize
541KB
MD56596b3b9f5928d9a5332be4b4c660756
SHA1281e06c367e03b45e4dcc89911882baa2ba14650
SHA256077ed4d88a1bf54956a0581434b7578f8169574e33cf30b06f48374f69f545a8
SHA512a3e4f9985fba41e64e525aa78cdacbc99ea0fac814a86bbe469e41fb1211755c1771993631eee0aeb1a6e5bc9c1e1b4e3f8539bdb237a18e34dd09643c59a5fe
-
Filesize
258KB
MD525bb07ad99d655dc5e1733ba0e820770
SHA11d41dc2b3f821b0fc405a4097f033217b771eb80
SHA25666187d4e48e9e2a1a0006f5f4870222aa2cf692c29c31ceb98f24d069fda7841
SHA5124adb28173f31539f8561132291f93d48f9797c223fd6148bd2fef2298b52c2578b0a28db6fea41fb5f4f81476b7696d6b69376855380bdfe9bdd677a8cf24ec4
-
Filesize
258KB
MD525bb07ad99d655dc5e1733ba0e820770
SHA11d41dc2b3f821b0fc405a4097f033217b771eb80
SHA25666187d4e48e9e2a1a0006f5f4870222aa2cf692c29c31ceb98f24d069fda7841
SHA5124adb28173f31539f8561132291f93d48f9797c223fd6148bd2fef2298b52c2578b0a28db6fea41fb5f4f81476b7696d6b69376855380bdfe9bdd677a8cf24ec4