Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    201s
  • max time network
    199s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 20:31

General

  • Target

    10403fbb929ac5c352c5542fe4da82438a48c1bfeb034f12c794c063dded227b.exe

  • Size

    747KB

  • MD5

    534b48e6b10322870a892162cf33b6ef

  • SHA1

    770e2d351430f0fbecc947015e32e72731e7b0dd

  • SHA256

    10403fbb929ac5c352c5542fe4da82438a48c1bfeb034f12c794c063dded227b

  • SHA512

    ea9c1c51fd4d19b7e6772206aabf29d92e6a243e18912e7920d40a14e843c9d80e41092e2c5c8ad28c881a17ef42e91828f909fd77209774c227b61eb03f60d5

  • SSDEEP

    12288:Ky90G70Iwzv6Z2Fdz0L0GY5BXa8uY9C9r8dcffYvbn4T5B17JbY4wB2lTJdD:KyW7v6Od04p5nr9+rMcovkT5TFbYZcTb

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10403fbb929ac5c352c5542fe4da82438a48c1bfeb034f12c794c063dded227b.exe
    "C:\Users\Admin\AppData\Local\Temp\10403fbb929ac5c352c5542fe4da82438a48c1bfeb034f12c794c063dded227b.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1404
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un402047.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un402047.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:268
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91828366.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91828366.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:440
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk742353.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk742353.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1796

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un402047.exe

    Filesize

    592KB

    MD5

    9103cc01bdd64fd6cdce38fd7e57bcf8

    SHA1

    b273ac7452fa77948a8d55babb219099df44ffcd

    SHA256

    049d3b83f301b6a386d6b1470059db430b30ba8e10f574473abb9a7c30281734

    SHA512

    94e9f884b05c0a11ac6a291a81f0281f964d90296030e553824a8c40e504cdd37c2d90250ce4e2037f3d9e5713fb394e07558e54b6ef4fc43bfe3294b55a5ee9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un402047.exe

    Filesize

    592KB

    MD5

    9103cc01bdd64fd6cdce38fd7e57bcf8

    SHA1

    b273ac7452fa77948a8d55babb219099df44ffcd

    SHA256

    049d3b83f301b6a386d6b1470059db430b30ba8e10f574473abb9a7c30281734

    SHA512

    94e9f884b05c0a11ac6a291a81f0281f964d90296030e553824a8c40e504cdd37c2d90250ce4e2037f3d9e5713fb394e07558e54b6ef4fc43bfe3294b55a5ee9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91828366.exe

    Filesize

    377KB

    MD5

    872744d1bc73da14be494f12759a7612

    SHA1

    2bdb2c97fe194722b448bcccade8ffa11ded876d

    SHA256

    de540dbc9e11538a809772753b06097d2a868b4e831e277b08078b589f00b353

    SHA512

    cea9006616d66802868395bc1928c0788b2e5dea5a3eb3719319c6052e0ef9e6b23181b4657379502f4e7e3faab7a94d272c17a80eaa09d1bc6eb93f1d869165

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91828366.exe

    Filesize

    377KB

    MD5

    872744d1bc73da14be494f12759a7612

    SHA1

    2bdb2c97fe194722b448bcccade8ffa11ded876d

    SHA256

    de540dbc9e11538a809772753b06097d2a868b4e831e277b08078b589f00b353

    SHA512

    cea9006616d66802868395bc1928c0788b2e5dea5a3eb3719319c6052e0ef9e6b23181b4657379502f4e7e3faab7a94d272c17a80eaa09d1bc6eb93f1d869165

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91828366.exe

    Filesize

    377KB

    MD5

    872744d1bc73da14be494f12759a7612

    SHA1

    2bdb2c97fe194722b448bcccade8ffa11ded876d

    SHA256

    de540dbc9e11538a809772753b06097d2a868b4e831e277b08078b589f00b353

    SHA512

    cea9006616d66802868395bc1928c0788b2e5dea5a3eb3719319c6052e0ef9e6b23181b4657379502f4e7e3faab7a94d272c17a80eaa09d1bc6eb93f1d869165

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk742353.exe

    Filesize

    459KB

    MD5

    3620e6d433e2f628ebf115bd42b94ae9

    SHA1

    27640473d87aed1fbf6473af0b2b4e2696f4927e

    SHA256

    3730bec82c4583037693be9134a6a1e3623777cfcb254335707f1916def449b0

    SHA512

    66a02ae8de951e782875e9f02223442c7e265b36addcf8e42a0663546be6ba6fe5b255d209d1e09cb795e497f957c4e7f61451e592cb9ed2a91615bc12477491

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk742353.exe

    Filesize

    459KB

    MD5

    3620e6d433e2f628ebf115bd42b94ae9

    SHA1

    27640473d87aed1fbf6473af0b2b4e2696f4927e

    SHA256

    3730bec82c4583037693be9134a6a1e3623777cfcb254335707f1916def449b0

    SHA512

    66a02ae8de951e782875e9f02223442c7e265b36addcf8e42a0663546be6ba6fe5b255d209d1e09cb795e497f957c4e7f61451e592cb9ed2a91615bc12477491

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk742353.exe

    Filesize

    459KB

    MD5

    3620e6d433e2f628ebf115bd42b94ae9

    SHA1

    27640473d87aed1fbf6473af0b2b4e2696f4927e

    SHA256

    3730bec82c4583037693be9134a6a1e3623777cfcb254335707f1916def449b0

    SHA512

    66a02ae8de951e782875e9f02223442c7e265b36addcf8e42a0663546be6ba6fe5b255d209d1e09cb795e497f957c4e7f61451e592cb9ed2a91615bc12477491

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un402047.exe

    Filesize

    592KB

    MD5

    9103cc01bdd64fd6cdce38fd7e57bcf8

    SHA1

    b273ac7452fa77948a8d55babb219099df44ffcd

    SHA256

    049d3b83f301b6a386d6b1470059db430b30ba8e10f574473abb9a7c30281734

    SHA512

    94e9f884b05c0a11ac6a291a81f0281f964d90296030e553824a8c40e504cdd37c2d90250ce4e2037f3d9e5713fb394e07558e54b6ef4fc43bfe3294b55a5ee9

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un402047.exe

    Filesize

    592KB

    MD5

    9103cc01bdd64fd6cdce38fd7e57bcf8

    SHA1

    b273ac7452fa77948a8d55babb219099df44ffcd

    SHA256

    049d3b83f301b6a386d6b1470059db430b30ba8e10f574473abb9a7c30281734

    SHA512

    94e9f884b05c0a11ac6a291a81f0281f964d90296030e553824a8c40e504cdd37c2d90250ce4e2037f3d9e5713fb394e07558e54b6ef4fc43bfe3294b55a5ee9

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\91828366.exe

    Filesize

    377KB

    MD5

    872744d1bc73da14be494f12759a7612

    SHA1

    2bdb2c97fe194722b448bcccade8ffa11ded876d

    SHA256

    de540dbc9e11538a809772753b06097d2a868b4e831e277b08078b589f00b353

    SHA512

    cea9006616d66802868395bc1928c0788b2e5dea5a3eb3719319c6052e0ef9e6b23181b4657379502f4e7e3faab7a94d272c17a80eaa09d1bc6eb93f1d869165

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\91828366.exe

    Filesize

    377KB

    MD5

    872744d1bc73da14be494f12759a7612

    SHA1

    2bdb2c97fe194722b448bcccade8ffa11ded876d

    SHA256

    de540dbc9e11538a809772753b06097d2a868b4e831e277b08078b589f00b353

    SHA512

    cea9006616d66802868395bc1928c0788b2e5dea5a3eb3719319c6052e0ef9e6b23181b4657379502f4e7e3faab7a94d272c17a80eaa09d1bc6eb93f1d869165

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\91828366.exe

    Filesize

    377KB

    MD5

    872744d1bc73da14be494f12759a7612

    SHA1

    2bdb2c97fe194722b448bcccade8ffa11ded876d

    SHA256

    de540dbc9e11538a809772753b06097d2a868b4e831e277b08078b589f00b353

    SHA512

    cea9006616d66802868395bc1928c0788b2e5dea5a3eb3719319c6052e0ef9e6b23181b4657379502f4e7e3faab7a94d272c17a80eaa09d1bc6eb93f1d869165

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk742353.exe

    Filesize

    459KB

    MD5

    3620e6d433e2f628ebf115bd42b94ae9

    SHA1

    27640473d87aed1fbf6473af0b2b4e2696f4927e

    SHA256

    3730bec82c4583037693be9134a6a1e3623777cfcb254335707f1916def449b0

    SHA512

    66a02ae8de951e782875e9f02223442c7e265b36addcf8e42a0663546be6ba6fe5b255d209d1e09cb795e497f957c4e7f61451e592cb9ed2a91615bc12477491

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk742353.exe

    Filesize

    459KB

    MD5

    3620e6d433e2f628ebf115bd42b94ae9

    SHA1

    27640473d87aed1fbf6473af0b2b4e2696f4927e

    SHA256

    3730bec82c4583037693be9134a6a1e3623777cfcb254335707f1916def449b0

    SHA512

    66a02ae8de951e782875e9f02223442c7e265b36addcf8e42a0663546be6ba6fe5b255d209d1e09cb795e497f957c4e7f61451e592cb9ed2a91615bc12477491

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk742353.exe

    Filesize

    459KB

    MD5

    3620e6d433e2f628ebf115bd42b94ae9

    SHA1

    27640473d87aed1fbf6473af0b2b4e2696f4927e

    SHA256

    3730bec82c4583037693be9134a6a1e3623777cfcb254335707f1916def449b0

    SHA512

    66a02ae8de951e782875e9f02223442c7e265b36addcf8e42a0663546be6ba6fe5b255d209d1e09cb795e497f957c4e7f61451e592cb9ed2a91615bc12477491

  • memory/440-108-0x0000000000240000-0x000000000026D000-memory.dmp

    Filesize

    180KB

  • memory/440-87-0x0000000000F40000-0x0000000000F52000-memory.dmp

    Filesize

    72KB

  • memory/440-89-0x0000000000F40000-0x0000000000F52000-memory.dmp

    Filesize

    72KB

  • memory/440-101-0x0000000000F40000-0x0000000000F52000-memory.dmp

    Filesize

    72KB

  • memory/440-107-0x0000000000F40000-0x0000000000F52000-memory.dmp

    Filesize

    72KB

  • memory/440-105-0x0000000000F40000-0x0000000000F52000-memory.dmp

    Filesize

    72KB

  • memory/440-103-0x0000000000F40000-0x0000000000F52000-memory.dmp

    Filesize

    72KB

  • memory/440-99-0x0000000000F40000-0x0000000000F52000-memory.dmp

    Filesize

    72KB

  • memory/440-97-0x0000000000F40000-0x0000000000F52000-memory.dmp

    Filesize

    72KB

  • memory/440-95-0x0000000000F40000-0x0000000000F52000-memory.dmp

    Filesize

    72KB

  • memory/440-93-0x0000000000F40000-0x0000000000F52000-memory.dmp

    Filesize

    72KB

  • memory/440-91-0x0000000000F40000-0x0000000000F52000-memory.dmp

    Filesize

    72KB

  • memory/440-110-0x0000000004F60000-0x0000000004FA0000-memory.dmp

    Filesize

    256KB

  • memory/440-109-0x0000000004F60000-0x0000000004FA0000-memory.dmp

    Filesize

    256KB

  • memory/440-85-0x0000000000F40000-0x0000000000F52000-memory.dmp

    Filesize

    72KB

  • memory/440-111-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/440-83-0x0000000000F40000-0x0000000000F52000-memory.dmp

    Filesize

    72KB

  • memory/440-81-0x0000000000F40000-0x0000000000F52000-memory.dmp

    Filesize

    72KB

  • memory/440-80-0x0000000000F40000-0x0000000000F52000-memory.dmp

    Filesize

    72KB

  • memory/440-112-0x0000000004F60000-0x0000000004FA0000-memory.dmp

    Filesize

    256KB

  • memory/440-114-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/440-79-0x0000000000F40000-0x0000000000F58000-memory.dmp

    Filesize

    96KB

  • memory/440-78-0x0000000000930000-0x000000000094A000-memory.dmp

    Filesize

    104KB

  • memory/1796-125-0x00000000025E0000-0x000000000261C000-memory.dmp

    Filesize

    240KB

  • memory/1796-126-0x0000000002620000-0x000000000265A000-memory.dmp

    Filesize

    232KB

  • memory/1796-127-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/1796-128-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/1796-130-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/1796-132-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/1796-134-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/1796-136-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/1796-138-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/1796-140-0x00000000002E0000-0x0000000000326000-memory.dmp

    Filesize

    280KB

  • memory/1796-141-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/1796-143-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/1796-145-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/1796-147-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/1796-149-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/1796-151-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/1796-153-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/1796-155-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/1796-157-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/1796-159-0x0000000002620000-0x0000000002655000-memory.dmp

    Filesize

    212KB

  • memory/1796-921-0x0000000004FD0000-0x0000000005010000-memory.dmp

    Filesize

    256KB

  • memory/1796-923-0x0000000004FD0000-0x0000000005010000-memory.dmp

    Filesize

    256KB