Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 20:08

General

  • Target

    00926b3d4f85269d529853c42e0dd129899316d787da8618a8e848f5a6f3ba11.exe

  • Size

    562KB

  • MD5

    97c595cb66e1f6deec551420e3200b47

  • SHA1

    a057ae45da59a8377be5657debbc4e3d1a258726

  • SHA256

    00926b3d4f85269d529853c42e0dd129899316d787da8618a8e848f5a6f3ba11

  • SHA512

    599738cd1eee0ca92abf95d755a4eb7a61f69ba7924c824079b990a0eb6f1e06bd92e66ece03d6a45090cad47a70824994c0906e2fa81547175ae77e927a888c

  • SSDEEP

    12288:7y90y2tPo9hlrUUqKXHUSNV4CzXEbaNI57DutqbYFweOFB:7y7rb0KX1V4+0aq8EbFe+

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00926b3d4f85269d529853c42e0dd129899316d787da8618a8e848f5a6f3ba11.exe
    "C:\Users\Admin\AppData\Local\Temp\00926b3d4f85269d529853c42e0dd129899316d787da8618a8e848f5a6f3ba11.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1136
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st015424.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st015424.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\85430701.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\85430701.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:756
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp809904.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp809904.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:468

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st015424.exe

    Filesize

    408KB

    MD5

    c0d108ef2a50bb7599a46d4bd76f47dc

    SHA1

    d636da4b79b091ea33dc5b46d29f65567cd6482e

    SHA256

    6358fd6e55d11e7d13078135e2ae432aaae07feaa99bcf5925a36a493b060928

    SHA512

    2d56da6309c95628621893df6423b90d0af612b7159c9667dc0a7d16d31e23cb6fef57e6c8f97205af270b067711427bb659c02fca0ccf461d4a45a70eafe441

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st015424.exe

    Filesize

    408KB

    MD5

    c0d108ef2a50bb7599a46d4bd76f47dc

    SHA1

    d636da4b79b091ea33dc5b46d29f65567cd6482e

    SHA256

    6358fd6e55d11e7d13078135e2ae432aaae07feaa99bcf5925a36a493b060928

    SHA512

    2d56da6309c95628621893df6423b90d0af612b7159c9667dc0a7d16d31e23cb6fef57e6c8f97205af270b067711427bb659c02fca0ccf461d4a45a70eafe441

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\85430701.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\85430701.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp809904.exe

    Filesize

    360KB

    MD5

    dfcd60299f669f82e3636032628c9dae

    SHA1

    2d9939d36a6d3ac6dece4dfc3d7952929def11b3

    SHA256

    b23d3e3117b4327785e8e0e2656f5cb0be498dab93d6c060f9635d81a0d74b92

    SHA512

    4dc6a273b1b7213734919cabc52f529360fa46e8a4e8e682b5b28e21fe32fb2fa7ae68e5698ef47e39de5e25c2793808dca86fe09efa77580c137ba50ae8af35

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp809904.exe

    Filesize

    360KB

    MD5

    dfcd60299f669f82e3636032628c9dae

    SHA1

    2d9939d36a6d3ac6dece4dfc3d7952929def11b3

    SHA256

    b23d3e3117b4327785e8e0e2656f5cb0be498dab93d6c060f9635d81a0d74b92

    SHA512

    4dc6a273b1b7213734919cabc52f529360fa46e8a4e8e682b5b28e21fe32fb2fa7ae68e5698ef47e39de5e25c2793808dca86fe09efa77580c137ba50ae8af35

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp809904.exe

    Filesize

    360KB

    MD5

    dfcd60299f669f82e3636032628c9dae

    SHA1

    2d9939d36a6d3ac6dece4dfc3d7952929def11b3

    SHA256

    b23d3e3117b4327785e8e0e2656f5cb0be498dab93d6c060f9635d81a0d74b92

    SHA512

    4dc6a273b1b7213734919cabc52f529360fa46e8a4e8e682b5b28e21fe32fb2fa7ae68e5698ef47e39de5e25c2793808dca86fe09efa77580c137ba50ae8af35

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st015424.exe

    Filesize

    408KB

    MD5

    c0d108ef2a50bb7599a46d4bd76f47dc

    SHA1

    d636da4b79b091ea33dc5b46d29f65567cd6482e

    SHA256

    6358fd6e55d11e7d13078135e2ae432aaae07feaa99bcf5925a36a493b060928

    SHA512

    2d56da6309c95628621893df6423b90d0af612b7159c9667dc0a7d16d31e23cb6fef57e6c8f97205af270b067711427bb659c02fca0ccf461d4a45a70eafe441

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st015424.exe

    Filesize

    408KB

    MD5

    c0d108ef2a50bb7599a46d4bd76f47dc

    SHA1

    d636da4b79b091ea33dc5b46d29f65567cd6482e

    SHA256

    6358fd6e55d11e7d13078135e2ae432aaae07feaa99bcf5925a36a493b060928

    SHA512

    2d56da6309c95628621893df6423b90d0af612b7159c9667dc0a7d16d31e23cb6fef57e6c8f97205af270b067711427bb659c02fca0ccf461d4a45a70eafe441

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\85430701.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp809904.exe

    Filesize

    360KB

    MD5

    dfcd60299f669f82e3636032628c9dae

    SHA1

    2d9939d36a6d3ac6dece4dfc3d7952929def11b3

    SHA256

    b23d3e3117b4327785e8e0e2656f5cb0be498dab93d6c060f9635d81a0d74b92

    SHA512

    4dc6a273b1b7213734919cabc52f529360fa46e8a4e8e682b5b28e21fe32fb2fa7ae68e5698ef47e39de5e25c2793808dca86fe09efa77580c137ba50ae8af35

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp809904.exe

    Filesize

    360KB

    MD5

    dfcd60299f669f82e3636032628c9dae

    SHA1

    2d9939d36a6d3ac6dece4dfc3d7952929def11b3

    SHA256

    b23d3e3117b4327785e8e0e2656f5cb0be498dab93d6c060f9635d81a0d74b92

    SHA512

    4dc6a273b1b7213734919cabc52f529360fa46e8a4e8e682b5b28e21fe32fb2fa7ae68e5698ef47e39de5e25c2793808dca86fe09efa77580c137ba50ae8af35

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp809904.exe

    Filesize

    360KB

    MD5

    dfcd60299f669f82e3636032628c9dae

    SHA1

    2d9939d36a6d3ac6dece4dfc3d7952929def11b3

    SHA256

    b23d3e3117b4327785e8e0e2656f5cb0be498dab93d6c060f9635d81a0d74b92

    SHA512

    4dc6a273b1b7213734919cabc52f529360fa46e8a4e8e682b5b28e21fe32fb2fa7ae68e5698ef47e39de5e25c2793808dca86fe09efa77580c137ba50ae8af35

  • memory/468-105-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-133-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-85-0x0000000004B60000-0x0000000004B9A000-memory.dmp

    Filesize

    232KB

  • memory/468-86-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-89-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-95-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-93-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-91-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-87-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-101-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-103-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-109-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-111-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-107-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-113-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-83-0x00000000002D0000-0x0000000000316000-memory.dmp

    Filesize

    280KB

  • memory/468-119-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-117-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-115-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-123-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-135-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-84-0x0000000004B20000-0x0000000004B5C000-memory.dmp

    Filesize

    240KB

  • memory/468-139-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-145-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-143-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-141-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-149-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-147-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-137-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-131-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-129-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-127-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-125-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-121-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-99-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-97-0x0000000004B60000-0x0000000004B95000-memory.dmp

    Filesize

    212KB

  • memory/468-345-0x0000000007240000-0x0000000007280000-memory.dmp

    Filesize

    256KB

  • memory/468-347-0x0000000007240000-0x0000000007280000-memory.dmp

    Filesize

    256KB

  • memory/468-349-0x0000000007240000-0x0000000007280000-memory.dmp

    Filesize

    256KB

  • memory/468-881-0x0000000007240000-0x0000000007280000-memory.dmp

    Filesize

    256KB

  • memory/468-883-0x0000000007240000-0x0000000007280000-memory.dmp

    Filesize

    256KB

  • memory/468-884-0x0000000007240000-0x0000000007280000-memory.dmp

    Filesize

    256KB

  • memory/468-885-0x0000000007240000-0x0000000007280000-memory.dmp

    Filesize

    256KB

  • memory/756-72-0x0000000000840000-0x000000000084A000-memory.dmp

    Filesize

    40KB