Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
229s -
max time network
274s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:15
Static task
static1
Behavioral task
behavioral1
Sample
328285beaa8c87f6d93d10b98ce2e28b20485d91f24e09833a81fcdd572b8746.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
328285beaa8c87f6d93d10b98ce2e28b20485d91f24e09833a81fcdd572b8746.exe
Resource
win10v2004-20230221-en
General
-
Target
328285beaa8c87f6d93d10b98ce2e28b20485d91f24e09833a81fcdd572b8746.exe
-
Size
1.7MB
-
MD5
f4701f9871797d251fa8837d71cb94ea
-
SHA1
9c1ce58dfcbb3a6ee9ee17a2ed7e369b36e37ef7
-
SHA256
328285beaa8c87f6d93d10b98ce2e28b20485d91f24e09833a81fcdd572b8746
-
SHA512
f362c011a9584b16e7a272db833856e9f6d800868b9981540c18a289972e287c3950a03ca7d7795f5df19d15383442260c78f240887057f5acf20c06c332429a
-
SSDEEP
24576:FyK2m12zmxbNW4WMH/6qXH5tmhRmDdpr9TbT+AqnUWwZQjhytC/3HdSp33BQ:gC5bs4WAXXZt8ROTP+cWjzPHdeH
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation a40849490.exe -
Executes dropped EXE 7 IoCs
pid Process 5004 KT440273.exe 3076 ef986775.exe 3868 RR361855.exe 5040 BL139447.exe 4996 a40849490.exe 2708 1.exe 4548 b15353844.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" KT440273.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ef986775.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" RR361855.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce BL139447.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 328285beaa8c87f6d93d10b98ce2e28b20485d91f24e09833a81fcdd572b8746.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 328285beaa8c87f6d93d10b98ce2e28b20485d91f24e09833a81fcdd572b8746.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce KT440273.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ef986775.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce RR361855.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" BL139447.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3064 4548 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2708 1.exe 2708 1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4996 a40849490.exe Token: SeDebugPrivilege 2708 1.exe Token: SeDebugPrivilege 4548 b15353844.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1692 wrote to memory of 5004 1692 328285beaa8c87f6d93d10b98ce2e28b20485d91f24e09833a81fcdd572b8746.exe 79 PID 1692 wrote to memory of 5004 1692 328285beaa8c87f6d93d10b98ce2e28b20485d91f24e09833a81fcdd572b8746.exe 79 PID 1692 wrote to memory of 5004 1692 328285beaa8c87f6d93d10b98ce2e28b20485d91f24e09833a81fcdd572b8746.exe 79 PID 5004 wrote to memory of 3076 5004 KT440273.exe 80 PID 5004 wrote to memory of 3076 5004 KT440273.exe 80 PID 5004 wrote to memory of 3076 5004 KT440273.exe 80 PID 3076 wrote to memory of 3868 3076 ef986775.exe 81 PID 3076 wrote to memory of 3868 3076 ef986775.exe 81 PID 3076 wrote to memory of 3868 3076 ef986775.exe 81 PID 3868 wrote to memory of 5040 3868 RR361855.exe 82 PID 3868 wrote to memory of 5040 3868 RR361855.exe 82 PID 3868 wrote to memory of 5040 3868 RR361855.exe 82 PID 5040 wrote to memory of 4996 5040 BL139447.exe 83 PID 5040 wrote to memory of 4996 5040 BL139447.exe 83 PID 5040 wrote to memory of 4996 5040 BL139447.exe 83 PID 4996 wrote to memory of 2708 4996 a40849490.exe 86 PID 4996 wrote to memory of 2708 4996 a40849490.exe 86 PID 5040 wrote to memory of 4548 5040 BL139447.exe 87 PID 5040 wrote to memory of 4548 5040 BL139447.exe 87 PID 5040 wrote to memory of 4548 5040 BL139447.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\328285beaa8c87f6d93d10b98ce2e28b20485d91f24e09833a81fcdd572b8746.exe"C:\Users\Admin\AppData\Local\Temp\328285beaa8c87f6d93d10b98ce2e28b20485d91f24e09833a81fcdd572b8746.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\KT440273.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\KT440273.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ef986775.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ef986775.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\RR361855.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\RR361855.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\BL139447.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\BL139447.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a40849490.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a40849490.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b15353844.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b15353844.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 12687⤵
- Program crash
PID:3064
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4548 -ip 45481⤵PID:1660
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD50a1f898b2a86b1cef3c7815f2669c79a
SHA15c100e11a604186bbef2f05117c3cf5d9c6f995f
SHA2563e18a7ccaf8a0fac67481ab76ba02b6091196626551ab039ce07318553db7323
SHA512115aaa82e856cd25bfdaff9887877a18189d5b32f3bf7da5d7c2d5ad5eefb372230d176da3d4f4b9881f5ddd1b8151b815f79b4260d8037ad11c65a32bbbc054
-
Filesize
1.4MB
MD50a1f898b2a86b1cef3c7815f2669c79a
SHA15c100e11a604186bbef2f05117c3cf5d9c6f995f
SHA2563e18a7ccaf8a0fac67481ab76ba02b6091196626551ab039ce07318553db7323
SHA512115aaa82e856cd25bfdaff9887877a18189d5b32f3bf7da5d7c2d5ad5eefb372230d176da3d4f4b9881f5ddd1b8151b815f79b4260d8037ad11c65a32bbbc054
-
Filesize
1.3MB
MD582e815109b67b7079249bddd325254eb
SHA17388289429b93350ad3c3caf7467aebc680e0212
SHA2564387e899267c8510ded6cebd29c36abfaba332e43b50578ccd2209432d00e71d
SHA5129543995f20728b097f93d1c0bfeb3973671bc5aadfe5e6b14f75b223364c8c405c0dd0cd8806725250b61c09b153876a3a6cb054dac265509a81d04c21e8e846
-
Filesize
1.3MB
MD582e815109b67b7079249bddd325254eb
SHA17388289429b93350ad3c3caf7467aebc680e0212
SHA2564387e899267c8510ded6cebd29c36abfaba332e43b50578ccd2209432d00e71d
SHA5129543995f20728b097f93d1c0bfeb3973671bc5aadfe5e6b14f75b223364c8c405c0dd0cd8806725250b61c09b153876a3a6cb054dac265509a81d04c21e8e846
-
Filesize
851KB
MD5c7e022ad8dafbfdd9ebecff1f10da219
SHA120260f9c09f47836fc607f35df8ecc54d5302c92
SHA256ad9794232b1194088a28c0f1d6807b4bb7dc67dca3e411c7a1126a565ad7f2ff
SHA5129177401c892707073c48c3793c9ca0887ad53e10083a630c0c3c89e2e91eb23ad9045fded0db64b8b57bfd716f9fff3d46458f217c72cc1ae9a5b073463c70a9
-
Filesize
851KB
MD5c7e022ad8dafbfdd9ebecff1f10da219
SHA120260f9c09f47836fc607f35df8ecc54d5302c92
SHA256ad9794232b1194088a28c0f1d6807b4bb7dc67dca3e411c7a1126a565ad7f2ff
SHA5129177401c892707073c48c3793c9ca0887ad53e10083a630c0c3c89e2e91eb23ad9045fded0db64b8b57bfd716f9fff3d46458f217c72cc1ae9a5b073463c70a9
-
Filesize
679KB
MD5e0e6ffce945ff30cef8bd2b6d1bd6e35
SHA1745b5bd4c7c51d5bef7a56423535a1e91302d42d
SHA256ec982611bdf9017fa58b4892ddc352c1c536cdf7db1143ec27e54402aa376829
SHA512be1a7908dcc6a4b12d50edd475acf2f159edc6009f5b1904d49692b4a803bdccec32b0a758c5482839fe76e1930e435919aeb921c28b2943417e203f844b63a4
-
Filesize
679KB
MD5e0e6ffce945ff30cef8bd2b6d1bd6e35
SHA1745b5bd4c7c51d5bef7a56423535a1e91302d42d
SHA256ec982611bdf9017fa58b4892ddc352c1c536cdf7db1143ec27e54402aa376829
SHA512be1a7908dcc6a4b12d50edd475acf2f159edc6009f5b1904d49692b4a803bdccec32b0a758c5482839fe76e1930e435919aeb921c28b2943417e203f844b63a4
-
Filesize
300KB
MD58d5aadde8827c810ee8f08e3ba7e0336
SHA15476117e14d3722e905a4c97c81987bb29086424
SHA2567694a7c73029d348a70ca93b3d9d7ebdeeda7823c01dd9e9a60732a7bb39a11e
SHA51297f39244c524eb5096d2da6701d95ec608ad00c69647a215879e88c16a658cb3ff3008ebc09d9dc746e4f5b328260f5ce70c8d62b309493534237cbdb852008c
-
Filesize
300KB
MD58d5aadde8827c810ee8f08e3ba7e0336
SHA15476117e14d3722e905a4c97c81987bb29086424
SHA2567694a7c73029d348a70ca93b3d9d7ebdeeda7823c01dd9e9a60732a7bb39a11e
SHA51297f39244c524eb5096d2da6701d95ec608ad00c69647a215879e88c16a658cb3ff3008ebc09d9dc746e4f5b328260f5ce70c8d62b309493534237cbdb852008c
-
Filesize
521KB
MD5913fe28ca0a4f65c057d5c6b11429755
SHA1c02261cc93bdc9d0ebdf9e80f5d1a4fe8e3d8366
SHA2569face85d75011baaa5973044028e0d2d57f832e5b712c3ce4746711c89fdf6eb
SHA5121149ee5143da6b78a257e5b27fbbe296d41bab96e9f7ec027066b0b1293459b443ac639819da549acd608164e224a47e70bd45d47e200a866a1353f3cd54e669
-
Filesize
521KB
MD5913fe28ca0a4f65c057d5c6b11429755
SHA1c02261cc93bdc9d0ebdf9e80f5d1a4fe8e3d8366
SHA2569face85d75011baaa5973044028e0d2d57f832e5b712c3ce4746711c89fdf6eb
SHA5121149ee5143da6b78a257e5b27fbbe296d41bab96e9f7ec027066b0b1293459b443ac639819da549acd608164e224a47e70bd45d47e200a866a1353f3cd54e669
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91