Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899.exe
Resource
win10v2004-20230220-en
General
-
Target
126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899.exe
-
Size
611KB
-
MD5
7d086131850c139d2df3a70db5eaa502
-
SHA1
9893e4cf7d2066e792401ac0799eb5cf29584798
-
SHA256
126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899
-
SHA512
58ca1ac62c87cd86654fe545d9afe570ab1cf953e5a71a2901c610622ce43d89f5d1d630fc157f311604fe9683ece59da195102d290108380a4d5794b0a6bd62
-
SSDEEP
12288:1y90i8ALkfEdTiqhN/baGu08k8sOqgSbaIikNNN7yk:1yF8Mkfiiqh9bvmZsbbfikvwk
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 20231186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 20231186.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 20231186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 20231186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 20231186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 20231186.exe -
Executes dropped EXE 3 IoCs
pid Process 1352 st185861.exe 1176 20231186.exe 596 kp613638.exe -
Loads dropped DLL 6 IoCs
pid Process 1444 126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899.exe 1352 st185861.exe 1352 st185861.exe 1352 st185861.exe 1352 st185861.exe 596 kp613638.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features 20231186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 20231186.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce st185861.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st185861.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1176 20231186.exe 1176 20231186.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1176 20231186.exe Token: SeDebugPrivilege 596 kp613638.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1352 1444 126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899.exe 27 PID 1444 wrote to memory of 1352 1444 126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899.exe 27 PID 1444 wrote to memory of 1352 1444 126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899.exe 27 PID 1444 wrote to memory of 1352 1444 126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899.exe 27 PID 1444 wrote to memory of 1352 1444 126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899.exe 27 PID 1444 wrote to memory of 1352 1444 126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899.exe 27 PID 1444 wrote to memory of 1352 1444 126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899.exe 27 PID 1352 wrote to memory of 1176 1352 st185861.exe 28 PID 1352 wrote to memory of 1176 1352 st185861.exe 28 PID 1352 wrote to memory of 1176 1352 st185861.exe 28 PID 1352 wrote to memory of 1176 1352 st185861.exe 28 PID 1352 wrote to memory of 1176 1352 st185861.exe 28 PID 1352 wrote to memory of 1176 1352 st185861.exe 28 PID 1352 wrote to memory of 1176 1352 st185861.exe 28 PID 1352 wrote to memory of 596 1352 st185861.exe 29 PID 1352 wrote to memory of 596 1352 st185861.exe 29 PID 1352 wrote to memory of 596 1352 st185861.exe 29 PID 1352 wrote to memory of 596 1352 st185861.exe 29 PID 1352 wrote to memory of 596 1352 st185861.exe 29 PID 1352 wrote to memory of 596 1352 st185861.exe 29 PID 1352 wrote to memory of 596 1352 st185861.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899.exe"C:\Users\Admin\AppData\Local\Temp\126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st185861.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st185861.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\20231186.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\20231186.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1176
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp613638.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp613638.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:596
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
457KB
MD5189a24fd0c6b93bee30a0577927e6dba
SHA118544d39d4826123a5e85ed4abd1f4c611a5aec5
SHA256e53afa30e5ba298ec669bff3cb3107ec2dfc2f179bf26d5bbb9b7c40cf40e478
SHA5121749ff20d3cee7659aa909296ac95237e00419161c7606a0aea0cf375fa863099ffa589fe6bf85437cc427b0428bf259a2be78afaa57500999eabda523ccbea7
-
Filesize
457KB
MD5189a24fd0c6b93bee30a0577927e6dba
SHA118544d39d4826123a5e85ed4abd1f4c611a5aec5
SHA256e53afa30e5ba298ec669bff3cb3107ec2dfc2f179bf26d5bbb9b7c40cf40e478
SHA5121749ff20d3cee7659aa909296ac95237e00419161c7606a0aea0cf375fa863099ffa589fe6bf85437cc427b0428bf259a2be78afaa57500999eabda523ccbea7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
459KB
MD516936e81c41d6253d35908b67870a85c
SHA1360bee9e200be15c048b156cfdf0d2e1873360cc
SHA2567bf59b580bb84db84838b13050b5cbf5ba649fcccf5f4a6372188331551f67b4
SHA5128b66034ea8566e0f8c81840c835f9ae13063257ed63317c09fa4b7f15052bbd9d35d507b310eb0845e89c399635cad502f76d228bc854e1bc192ad4041b49596
-
Filesize
459KB
MD516936e81c41d6253d35908b67870a85c
SHA1360bee9e200be15c048b156cfdf0d2e1873360cc
SHA2567bf59b580bb84db84838b13050b5cbf5ba649fcccf5f4a6372188331551f67b4
SHA5128b66034ea8566e0f8c81840c835f9ae13063257ed63317c09fa4b7f15052bbd9d35d507b310eb0845e89c399635cad502f76d228bc854e1bc192ad4041b49596
-
Filesize
459KB
MD516936e81c41d6253d35908b67870a85c
SHA1360bee9e200be15c048b156cfdf0d2e1873360cc
SHA2567bf59b580bb84db84838b13050b5cbf5ba649fcccf5f4a6372188331551f67b4
SHA5128b66034ea8566e0f8c81840c835f9ae13063257ed63317c09fa4b7f15052bbd9d35d507b310eb0845e89c399635cad502f76d228bc854e1bc192ad4041b49596
-
Filesize
457KB
MD5189a24fd0c6b93bee30a0577927e6dba
SHA118544d39d4826123a5e85ed4abd1f4c611a5aec5
SHA256e53afa30e5ba298ec669bff3cb3107ec2dfc2f179bf26d5bbb9b7c40cf40e478
SHA5121749ff20d3cee7659aa909296ac95237e00419161c7606a0aea0cf375fa863099ffa589fe6bf85437cc427b0428bf259a2be78afaa57500999eabda523ccbea7
-
Filesize
457KB
MD5189a24fd0c6b93bee30a0577927e6dba
SHA118544d39d4826123a5e85ed4abd1f4c611a5aec5
SHA256e53afa30e5ba298ec669bff3cb3107ec2dfc2f179bf26d5bbb9b7c40cf40e478
SHA5121749ff20d3cee7659aa909296ac95237e00419161c7606a0aea0cf375fa863099ffa589fe6bf85437cc427b0428bf259a2be78afaa57500999eabda523ccbea7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
459KB
MD516936e81c41d6253d35908b67870a85c
SHA1360bee9e200be15c048b156cfdf0d2e1873360cc
SHA2567bf59b580bb84db84838b13050b5cbf5ba649fcccf5f4a6372188331551f67b4
SHA5128b66034ea8566e0f8c81840c835f9ae13063257ed63317c09fa4b7f15052bbd9d35d507b310eb0845e89c399635cad502f76d228bc854e1bc192ad4041b49596
-
Filesize
459KB
MD516936e81c41d6253d35908b67870a85c
SHA1360bee9e200be15c048b156cfdf0d2e1873360cc
SHA2567bf59b580bb84db84838b13050b5cbf5ba649fcccf5f4a6372188331551f67b4
SHA5128b66034ea8566e0f8c81840c835f9ae13063257ed63317c09fa4b7f15052bbd9d35d507b310eb0845e89c399635cad502f76d228bc854e1bc192ad4041b49596
-
Filesize
459KB
MD516936e81c41d6253d35908b67870a85c
SHA1360bee9e200be15c048b156cfdf0d2e1873360cc
SHA2567bf59b580bb84db84838b13050b5cbf5ba649fcccf5f4a6372188331551f67b4
SHA5128b66034ea8566e0f8c81840c835f9ae13063257ed63317c09fa4b7f15052bbd9d35d507b310eb0845e89c399635cad502f76d228bc854e1bc192ad4041b49596