Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:25
Static task
static1
Behavioral task
behavioral1
Sample
3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5.exe
Resource
win10v2004-20230220-en
General
-
Target
3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5.exe
-
Size
745KB
-
MD5
8dc8dad544993e3ce28c5a379f65a8e5
-
SHA1
03a2e886652196d81d43481341b8ee60e4403ae2
-
SHA256
3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5
-
SHA512
ea3d05c1ee6cda020597e120d2c257c9f42ae6564358ffacae2ba79afa0a8da0ebe6372e269d9eb976d5e46c73eaefe194ff95273cc3dbed893ce5b2bc052b5a
-
SSDEEP
12288:wy90oDrRbVCeywfCk91G54VQhkt8qsh5QHYtAfJ9XwBt/XubQSpIWDL+Z:wyplgeywKk9854VQhk8qsvQHYQQ/XyWN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 11742726.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 11742726.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 11742726.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 11742726.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 11742726.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 11742726.exe -
Executes dropped EXE 3 IoCs
pid Process 864 un978554.exe 544 11742726.exe 1792 rk714837.exe -
Loads dropped DLL 8 IoCs
pid Process 1276 3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5.exe 864 un978554.exe 864 un978554.exe 864 un978554.exe 544 11742726.exe 864 un978554.exe 864 un978554.exe 1792 rk714837.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 11742726.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 11742726.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un978554.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un978554.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 544 11742726.exe 544 11742726.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 544 11742726.exe Token: SeDebugPrivilege 1792 rk714837.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1276 wrote to memory of 864 1276 3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5.exe 28 PID 1276 wrote to memory of 864 1276 3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5.exe 28 PID 1276 wrote to memory of 864 1276 3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5.exe 28 PID 1276 wrote to memory of 864 1276 3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5.exe 28 PID 1276 wrote to memory of 864 1276 3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5.exe 28 PID 1276 wrote to memory of 864 1276 3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5.exe 28 PID 1276 wrote to memory of 864 1276 3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5.exe 28 PID 864 wrote to memory of 544 864 un978554.exe 29 PID 864 wrote to memory of 544 864 un978554.exe 29 PID 864 wrote to memory of 544 864 un978554.exe 29 PID 864 wrote to memory of 544 864 un978554.exe 29 PID 864 wrote to memory of 544 864 un978554.exe 29 PID 864 wrote to memory of 544 864 un978554.exe 29 PID 864 wrote to memory of 544 864 un978554.exe 29 PID 864 wrote to memory of 1792 864 un978554.exe 30 PID 864 wrote to memory of 1792 864 un978554.exe 30 PID 864 wrote to memory of 1792 864 un978554.exe 30 PID 864 wrote to memory of 1792 864 un978554.exe 30 PID 864 wrote to memory of 1792 864 un978554.exe 30 PID 864 wrote to memory of 1792 864 un978554.exe 30 PID 864 wrote to memory of 1792 864 un978554.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5.exe"C:\Users\Admin\AppData\Local\Temp\3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un978554.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un978554.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11742726.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11742726.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:544
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk714837.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk714837.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
591KB
MD5a17e007dd6048c2c02a022137e4cc030
SHA1bc6bba3b02954745ed5fa3327f376cbaf0daaee3
SHA25634a3927796f663617157287c5620a1346ecef9c3d941467c2f2575995fa53fb3
SHA512c5442af76a381d77505263151637996bdd0a0c738e87edca294f704bb1ca3ab6722b315b47f4b68f358ac1bf343b8f001908932ffee1a09c4cf77196c19e04cb
-
Filesize
591KB
MD5a17e007dd6048c2c02a022137e4cc030
SHA1bc6bba3b02954745ed5fa3327f376cbaf0daaee3
SHA25634a3927796f663617157287c5620a1346ecef9c3d941467c2f2575995fa53fb3
SHA512c5442af76a381d77505263151637996bdd0a0c738e87edca294f704bb1ca3ab6722b315b47f4b68f358ac1bf343b8f001908932ffee1a09c4cf77196c19e04cb
-
Filesize
376KB
MD5ef9e2aa133f0d5a4b21b1f13b8a8162c
SHA1a4e6ddbee8b0c2f6464e0403551300508530167e
SHA256f057847f0283e9231c3511cfe7e5dd52c749a34507364dd4f7a08e3e22650ecf
SHA512f0c76340a67e1f3f954b0a0250daa34e054a66ec486890305a715a2d0dcd63f3f61998035763dbd3f6f6212eb882e21297ff5747876df31f69f157fa81574e58
-
Filesize
376KB
MD5ef9e2aa133f0d5a4b21b1f13b8a8162c
SHA1a4e6ddbee8b0c2f6464e0403551300508530167e
SHA256f057847f0283e9231c3511cfe7e5dd52c749a34507364dd4f7a08e3e22650ecf
SHA512f0c76340a67e1f3f954b0a0250daa34e054a66ec486890305a715a2d0dcd63f3f61998035763dbd3f6f6212eb882e21297ff5747876df31f69f157fa81574e58
-
Filesize
376KB
MD5ef9e2aa133f0d5a4b21b1f13b8a8162c
SHA1a4e6ddbee8b0c2f6464e0403551300508530167e
SHA256f057847f0283e9231c3511cfe7e5dd52c749a34507364dd4f7a08e3e22650ecf
SHA512f0c76340a67e1f3f954b0a0250daa34e054a66ec486890305a715a2d0dcd63f3f61998035763dbd3f6f6212eb882e21297ff5747876df31f69f157fa81574e58
-
Filesize
459KB
MD5993167dbb4417b2b3c57345f8d892939
SHA1e23ae38f684d3255ee13d27c50d5ec417b2073ae
SHA25640826115610828c394244667d6fa0fac3b3026860b8ba263dabdf2066cd0e1c1
SHA5127c160fe03a1bf5224bc0891c23efeb68d266cd83f21b9f83435664cb5f822441cec29057bc80de461cc6f8c090dd1384818341cf68c8978133efb80d935902dd
-
Filesize
459KB
MD5993167dbb4417b2b3c57345f8d892939
SHA1e23ae38f684d3255ee13d27c50d5ec417b2073ae
SHA25640826115610828c394244667d6fa0fac3b3026860b8ba263dabdf2066cd0e1c1
SHA5127c160fe03a1bf5224bc0891c23efeb68d266cd83f21b9f83435664cb5f822441cec29057bc80de461cc6f8c090dd1384818341cf68c8978133efb80d935902dd
-
Filesize
459KB
MD5993167dbb4417b2b3c57345f8d892939
SHA1e23ae38f684d3255ee13d27c50d5ec417b2073ae
SHA25640826115610828c394244667d6fa0fac3b3026860b8ba263dabdf2066cd0e1c1
SHA5127c160fe03a1bf5224bc0891c23efeb68d266cd83f21b9f83435664cb5f822441cec29057bc80de461cc6f8c090dd1384818341cf68c8978133efb80d935902dd
-
Filesize
591KB
MD5a17e007dd6048c2c02a022137e4cc030
SHA1bc6bba3b02954745ed5fa3327f376cbaf0daaee3
SHA25634a3927796f663617157287c5620a1346ecef9c3d941467c2f2575995fa53fb3
SHA512c5442af76a381d77505263151637996bdd0a0c738e87edca294f704bb1ca3ab6722b315b47f4b68f358ac1bf343b8f001908932ffee1a09c4cf77196c19e04cb
-
Filesize
591KB
MD5a17e007dd6048c2c02a022137e4cc030
SHA1bc6bba3b02954745ed5fa3327f376cbaf0daaee3
SHA25634a3927796f663617157287c5620a1346ecef9c3d941467c2f2575995fa53fb3
SHA512c5442af76a381d77505263151637996bdd0a0c738e87edca294f704bb1ca3ab6722b315b47f4b68f358ac1bf343b8f001908932ffee1a09c4cf77196c19e04cb
-
Filesize
376KB
MD5ef9e2aa133f0d5a4b21b1f13b8a8162c
SHA1a4e6ddbee8b0c2f6464e0403551300508530167e
SHA256f057847f0283e9231c3511cfe7e5dd52c749a34507364dd4f7a08e3e22650ecf
SHA512f0c76340a67e1f3f954b0a0250daa34e054a66ec486890305a715a2d0dcd63f3f61998035763dbd3f6f6212eb882e21297ff5747876df31f69f157fa81574e58
-
Filesize
376KB
MD5ef9e2aa133f0d5a4b21b1f13b8a8162c
SHA1a4e6ddbee8b0c2f6464e0403551300508530167e
SHA256f057847f0283e9231c3511cfe7e5dd52c749a34507364dd4f7a08e3e22650ecf
SHA512f0c76340a67e1f3f954b0a0250daa34e054a66ec486890305a715a2d0dcd63f3f61998035763dbd3f6f6212eb882e21297ff5747876df31f69f157fa81574e58
-
Filesize
376KB
MD5ef9e2aa133f0d5a4b21b1f13b8a8162c
SHA1a4e6ddbee8b0c2f6464e0403551300508530167e
SHA256f057847f0283e9231c3511cfe7e5dd52c749a34507364dd4f7a08e3e22650ecf
SHA512f0c76340a67e1f3f954b0a0250daa34e054a66ec486890305a715a2d0dcd63f3f61998035763dbd3f6f6212eb882e21297ff5747876df31f69f157fa81574e58
-
Filesize
459KB
MD5993167dbb4417b2b3c57345f8d892939
SHA1e23ae38f684d3255ee13d27c50d5ec417b2073ae
SHA25640826115610828c394244667d6fa0fac3b3026860b8ba263dabdf2066cd0e1c1
SHA5127c160fe03a1bf5224bc0891c23efeb68d266cd83f21b9f83435664cb5f822441cec29057bc80de461cc6f8c090dd1384818341cf68c8978133efb80d935902dd
-
Filesize
459KB
MD5993167dbb4417b2b3c57345f8d892939
SHA1e23ae38f684d3255ee13d27c50d5ec417b2073ae
SHA25640826115610828c394244667d6fa0fac3b3026860b8ba263dabdf2066cd0e1c1
SHA5127c160fe03a1bf5224bc0891c23efeb68d266cd83f21b9f83435664cb5f822441cec29057bc80de461cc6f8c090dd1384818341cf68c8978133efb80d935902dd
-
Filesize
459KB
MD5993167dbb4417b2b3c57345f8d892939
SHA1e23ae38f684d3255ee13d27c50d5ec417b2073ae
SHA25640826115610828c394244667d6fa0fac3b3026860b8ba263dabdf2066cd0e1c1
SHA5127c160fe03a1bf5224bc0891c23efeb68d266cd83f21b9f83435664cb5f822441cec29057bc80de461cc6f8c090dd1384818341cf68c8978133efb80d935902dd