Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    190s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 21:11

General

  • Target

    2f3e52216162db48e32a06954a8a8cd5df82b0d1fb27d5abaca81388801b359a.exe

  • Size

    746KB

  • MD5

    e4e716a0b8e190b6bb318178318f7421

  • SHA1

    33bdbdb03c72eb11e02cc5b5477d1689c1948bd4

  • SHA256

    2f3e52216162db48e32a06954a8a8cd5df82b0d1fb27d5abaca81388801b359a

  • SHA512

    e33893b67926afd8fa7b6792832866b05b46bcbdac3ba3ce994083f4fff020d3ddb10fd95fc8c7fb9e944338fce9fa7e149a186fc29825717d986627a5eb00b6

  • SSDEEP

    12288:Iy90Q1aVJmlvBnnyPcOL5WUMU7W0GUm5rvmh2R56sl248NPSJUdBllxknl78rn5:IyWVJmvhyPcw5/MU7WzfrG2/DcNPwG7Z

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f3e52216162db48e32a06954a8a8cd5df82b0d1fb27d5abaca81388801b359a.exe
    "C:\Users\Admin\AppData\Local\Temp\2f3e52216162db48e32a06954a8a8cd5df82b0d1fb27d5abaca81388801b359a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un285504.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un285504.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1304
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\83730441.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\83730441.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:580
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk657419.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk657419.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1836

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un285504.exe

    Filesize

    592KB

    MD5

    617d4f6291fa24b40dab8434bc664b43

    SHA1

    bd0343d8172752ebb6848bfb8c4a7f4481fc4a55

    SHA256

    acb568641e6a3667e281356cfd3cfc5deb59e8149731c0aad2a3f57299536636

    SHA512

    4719d4db706dffa923a0a7dd9da0fcc5f0e358516faaefc8df856577536ed0a93e7327ab909a93d6eabbb79448f133918824acedb3d2a5dc0e73df27ecb62721

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un285504.exe

    Filesize

    592KB

    MD5

    617d4f6291fa24b40dab8434bc664b43

    SHA1

    bd0343d8172752ebb6848bfb8c4a7f4481fc4a55

    SHA256

    acb568641e6a3667e281356cfd3cfc5deb59e8149731c0aad2a3f57299536636

    SHA512

    4719d4db706dffa923a0a7dd9da0fcc5f0e358516faaefc8df856577536ed0a93e7327ab909a93d6eabbb79448f133918824acedb3d2a5dc0e73df27ecb62721

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\83730441.exe

    Filesize

    377KB

    MD5

    90208df0ba58359e6bba0939e468f8a4

    SHA1

    70edf1c0f63f1f38a79cdec82d3774b38557d08d

    SHA256

    708bdea7a0971be71738361cfec577ded2d659a8c42b4af2b1f2854373d9443e

    SHA512

    a6d87ec8b1c59b46d376e4321326b29898a3cb4b447546a219739fc7224569f5d85fa6eaee1a64ff2fe72d8e5ac3b0778bef7f770c3b6881c61f9752beb594e9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\83730441.exe

    Filesize

    377KB

    MD5

    90208df0ba58359e6bba0939e468f8a4

    SHA1

    70edf1c0f63f1f38a79cdec82d3774b38557d08d

    SHA256

    708bdea7a0971be71738361cfec577ded2d659a8c42b4af2b1f2854373d9443e

    SHA512

    a6d87ec8b1c59b46d376e4321326b29898a3cb4b447546a219739fc7224569f5d85fa6eaee1a64ff2fe72d8e5ac3b0778bef7f770c3b6881c61f9752beb594e9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\83730441.exe

    Filesize

    377KB

    MD5

    90208df0ba58359e6bba0939e468f8a4

    SHA1

    70edf1c0f63f1f38a79cdec82d3774b38557d08d

    SHA256

    708bdea7a0971be71738361cfec577ded2d659a8c42b4af2b1f2854373d9443e

    SHA512

    a6d87ec8b1c59b46d376e4321326b29898a3cb4b447546a219739fc7224569f5d85fa6eaee1a64ff2fe72d8e5ac3b0778bef7f770c3b6881c61f9752beb594e9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk657419.exe

    Filesize

    459KB

    MD5

    da79495f3cd15173f52c4c11aae2927a

    SHA1

    a87aadedf50341f05abe3d8976722892fe80e103

    SHA256

    3660799614d52d064260bb0bc2c8a2fddf71d5db2f6b79ac885413dc99bdeeb9

    SHA512

    ffac1df415e677092710dbd443ce8aeeec03f677e5692705a7df7ef3602131fbbfd3ed389d7d5f786bc578abcf1d9bac81ea88891832e0a46eb0cda1a6643372

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk657419.exe

    Filesize

    459KB

    MD5

    da79495f3cd15173f52c4c11aae2927a

    SHA1

    a87aadedf50341f05abe3d8976722892fe80e103

    SHA256

    3660799614d52d064260bb0bc2c8a2fddf71d5db2f6b79ac885413dc99bdeeb9

    SHA512

    ffac1df415e677092710dbd443ce8aeeec03f677e5692705a7df7ef3602131fbbfd3ed389d7d5f786bc578abcf1d9bac81ea88891832e0a46eb0cda1a6643372

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk657419.exe

    Filesize

    459KB

    MD5

    da79495f3cd15173f52c4c11aae2927a

    SHA1

    a87aadedf50341f05abe3d8976722892fe80e103

    SHA256

    3660799614d52d064260bb0bc2c8a2fddf71d5db2f6b79ac885413dc99bdeeb9

    SHA512

    ffac1df415e677092710dbd443ce8aeeec03f677e5692705a7df7ef3602131fbbfd3ed389d7d5f786bc578abcf1d9bac81ea88891832e0a46eb0cda1a6643372

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un285504.exe

    Filesize

    592KB

    MD5

    617d4f6291fa24b40dab8434bc664b43

    SHA1

    bd0343d8172752ebb6848bfb8c4a7f4481fc4a55

    SHA256

    acb568641e6a3667e281356cfd3cfc5deb59e8149731c0aad2a3f57299536636

    SHA512

    4719d4db706dffa923a0a7dd9da0fcc5f0e358516faaefc8df856577536ed0a93e7327ab909a93d6eabbb79448f133918824acedb3d2a5dc0e73df27ecb62721

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un285504.exe

    Filesize

    592KB

    MD5

    617d4f6291fa24b40dab8434bc664b43

    SHA1

    bd0343d8172752ebb6848bfb8c4a7f4481fc4a55

    SHA256

    acb568641e6a3667e281356cfd3cfc5deb59e8149731c0aad2a3f57299536636

    SHA512

    4719d4db706dffa923a0a7dd9da0fcc5f0e358516faaefc8df856577536ed0a93e7327ab909a93d6eabbb79448f133918824acedb3d2a5dc0e73df27ecb62721

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\83730441.exe

    Filesize

    377KB

    MD5

    90208df0ba58359e6bba0939e468f8a4

    SHA1

    70edf1c0f63f1f38a79cdec82d3774b38557d08d

    SHA256

    708bdea7a0971be71738361cfec577ded2d659a8c42b4af2b1f2854373d9443e

    SHA512

    a6d87ec8b1c59b46d376e4321326b29898a3cb4b447546a219739fc7224569f5d85fa6eaee1a64ff2fe72d8e5ac3b0778bef7f770c3b6881c61f9752beb594e9

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\83730441.exe

    Filesize

    377KB

    MD5

    90208df0ba58359e6bba0939e468f8a4

    SHA1

    70edf1c0f63f1f38a79cdec82d3774b38557d08d

    SHA256

    708bdea7a0971be71738361cfec577ded2d659a8c42b4af2b1f2854373d9443e

    SHA512

    a6d87ec8b1c59b46d376e4321326b29898a3cb4b447546a219739fc7224569f5d85fa6eaee1a64ff2fe72d8e5ac3b0778bef7f770c3b6881c61f9752beb594e9

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\83730441.exe

    Filesize

    377KB

    MD5

    90208df0ba58359e6bba0939e468f8a4

    SHA1

    70edf1c0f63f1f38a79cdec82d3774b38557d08d

    SHA256

    708bdea7a0971be71738361cfec577ded2d659a8c42b4af2b1f2854373d9443e

    SHA512

    a6d87ec8b1c59b46d376e4321326b29898a3cb4b447546a219739fc7224569f5d85fa6eaee1a64ff2fe72d8e5ac3b0778bef7f770c3b6881c61f9752beb594e9

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk657419.exe

    Filesize

    459KB

    MD5

    da79495f3cd15173f52c4c11aae2927a

    SHA1

    a87aadedf50341f05abe3d8976722892fe80e103

    SHA256

    3660799614d52d064260bb0bc2c8a2fddf71d5db2f6b79ac885413dc99bdeeb9

    SHA512

    ffac1df415e677092710dbd443ce8aeeec03f677e5692705a7df7ef3602131fbbfd3ed389d7d5f786bc578abcf1d9bac81ea88891832e0a46eb0cda1a6643372

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk657419.exe

    Filesize

    459KB

    MD5

    da79495f3cd15173f52c4c11aae2927a

    SHA1

    a87aadedf50341f05abe3d8976722892fe80e103

    SHA256

    3660799614d52d064260bb0bc2c8a2fddf71d5db2f6b79ac885413dc99bdeeb9

    SHA512

    ffac1df415e677092710dbd443ce8aeeec03f677e5692705a7df7ef3602131fbbfd3ed389d7d5f786bc578abcf1d9bac81ea88891832e0a46eb0cda1a6643372

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk657419.exe

    Filesize

    459KB

    MD5

    da79495f3cd15173f52c4c11aae2927a

    SHA1

    a87aadedf50341f05abe3d8976722892fe80e103

    SHA256

    3660799614d52d064260bb0bc2c8a2fddf71d5db2f6b79ac885413dc99bdeeb9

    SHA512

    ffac1df415e677092710dbd443ce8aeeec03f677e5692705a7df7ef3602131fbbfd3ed389d7d5f786bc578abcf1d9bac81ea88891832e0a46eb0cda1a6643372

  • memory/580-113-0x0000000000BF0000-0x0000000000C02000-memory.dmp

    Filesize

    72KB

  • memory/580-86-0x0000000000BF0000-0x0000000000C02000-memory.dmp

    Filesize

    72KB

  • memory/580-87-0x0000000000BF0000-0x0000000000C02000-memory.dmp

    Filesize

    72KB

  • memory/580-89-0x0000000000BF0000-0x0000000000C02000-memory.dmp

    Filesize

    72KB

  • memory/580-93-0x0000000000BF0000-0x0000000000C02000-memory.dmp

    Filesize

    72KB

  • memory/580-91-0x0000000000BF0000-0x0000000000C02000-memory.dmp

    Filesize

    72KB

  • memory/580-97-0x0000000000BF0000-0x0000000000C02000-memory.dmp

    Filesize

    72KB

  • memory/580-95-0x0000000000BF0000-0x0000000000C02000-memory.dmp

    Filesize

    72KB

  • memory/580-101-0x0000000000BF0000-0x0000000000C02000-memory.dmp

    Filesize

    72KB

  • memory/580-99-0x0000000000BF0000-0x0000000000C02000-memory.dmp

    Filesize

    72KB

  • memory/580-105-0x0000000000BF0000-0x0000000000C02000-memory.dmp

    Filesize

    72KB

  • memory/580-103-0x0000000000BF0000-0x0000000000C02000-memory.dmp

    Filesize

    72KB

  • memory/580-107-0x0000000000BF0000-0x0000000000C02000-memory.dmp

    Filesize

    72KB

  • memory/580-109-0x0000000000BF0000-0x0000000000C02000-memory.dmp

    Filesize

    72KB

  • memory/580-84-0x0000000004CB0000-0x0000000004CF0000-memory.dmp

    Filesize

    256KB

  • memory/580-111-0x0000000000BF0000-0x0000000000C02000-memory.dmp

    Filesize

    72KB

  • memory/580-116-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/580-83-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/580-82-0x0000000004CB0000-0x0000000004CF0000-memory.dmp

    Filesize

    256KB

  • memory/580-81-0x0000000004CB0000-0x0000000004CF0000-memory.dmp

    Filesize

    256KB

  • memory/580-80-0x0000000000BF0000-0x0000000000C08000-memory.dmp

    Filesize

    96KB

  • memory/580-79-0x0000000000B60000-0x0000000000B7A000-memory.dmp

    Filesize

    104KB

  • memory/580-78-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/1836-127-0x0000000002500000-0x000000000253C000-memory.dmp

    Filesize

    240KB

  • memory/1836-128-0x0000000002540000-0x000000000257A000-memory.dmp

    Filesize

    232KB

  • memory/1836-129-0x0000000002540000-0x0000000002575000-memory.dmp

    Filesize

    212KB

  • memory/1836-130-0x0000000002540000-0x0000000002575000-memory.dmp

    Filesize

    212KB

  • memory/1836-132-0x0000000002540000-0x0000000002575000-memory.dmp

    Filesize

    212KB

  • memory/1836-134-0x0000000002540000-0x0000000002575000-memory.dmp

    Filesize

    212KB

  • memory/1836-136-0x0000000002540000-0x0000000002575000-memory.dmp

    Filesize

    212KB

  • memory/1836-138-0x0000000002540000-0x0000000002575000-memory.dmp

    Filesize

    212KB

  • memory/1836-140-0x0000000002540000-0x0000000002575000-memory.dmp

    Filesize

    212KB

  • memory/1836-142-0x0000000002540000-0x0000000002575000-memory.dmp

    Filesize

    212KB

  • memory/1836-144-0x0000000002540000-0x0000000002575000-memory.dmp

    Filesize

    212KB

  • memory/1836-146-0x0000000002540000-0x0000000002575000-memory.dmp

    Filesize

    212KB

  • memory/1836-148-0x0000000002540000-0x0000000002575000-memory.dmp

    Filesize

    212KB

  • memory/1836-150-0x0000000002540000-0x0000000002575000-memory.dmp

    Filesize

    212KB

  • memory/1836-152-0x0000000002540000-0x0000000002575000-memory.dmp

    Filesize

    212KB

  • memory/1836-154-0x0000000002540000-0x0000000002575000-memory.dmp

    Filesize

    212KB

  • memory/1836-156-0x0000000002540000-0x0000000002575000-memory.dmp

    Filesize

    212KB

  • memory/1836-158-0x0000000002540000-0x0000000002575000-memory.dmp

    Filesize

    212KB

  • memory/1836-669-0x0000000000270000-0x00000000002B6000-memory.dmp

    Filesize

    280KB

  • memory/1836-671-0x0000000004E60000-0x0000000004EA0000-memory.dmp

    Filesize

    256KB

  • memory/1836-923-0x0000000004E60000-0x0000000004EA0000-memory.dmp

    Filesize

    256KB

  • memory/1836-926-0x0000000004E60000-0x0000000004EA0000-memory.dmp

    Filesize

    256KB