Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 20:52
Static task
static1
Behavioral task
behavioral1
Sample
1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe
Resource
win10v2004-20230220-en
General
-
Target
1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe
-
Size
707KB
-
MD5
982a5fdc6779e4491d9a42aced94632d
-
SHA1
e4b5f1b040df9232e9a1210ba19df9684b4af431
-
SHA256
1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7
-
SHA512
dd5876ab60345c2654011c15b5b3956f4c2cbe83bbd0bcce7ee75d978d1ab237bd0a05e8c34907e94b88c52211b4cb75260a8e5577c797c5d5793f42939e0be4
-
SSDEEP
12288:Jy90R4cYuZUSZinTLlcNfgXxGk0STEn3OmYOIDA6kk/Ee4rY:JykvZUSZinTxcNfghGDV3CHYkEE
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 93344822.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 93344822.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 93344822.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 93344822.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 93344822.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 93344822.exe -
Executes dropped EXE 3 IoCs
pid Process 2012 un214049.exe 1188 93344822.exe 1636 rk207501.exe -
Loads dropped DLL 8 IoCs
pid Process 1720 1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe 2012 un214049.exe 2012 un214049.exe 2012 un214049.exe 1188 93344822.exe 2012 un214049.exe 2012 un214049.exe 1636 rk207501.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 93344822.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 93344822.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un214049.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un214049.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1188 93344822.exe 1188 93344822.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1188 93344822.exe Token: SeDebugPrivilege 1636 rk207501.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2012 1720 1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe 28 PID 1720 wrote to memory of 2012 1720 1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe 28 PID 1720 wrote to memory of 2012 1720 1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe 28 PID 1720 wrote to memory of 2012 1720 1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe 28 PID 1720 wrote to memory of 2012 1720 1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe 28 PID 1720 wrote to memory of 2012 1720 1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe 28 PID 1720 wrote to memory of 2012 1720 1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe 28 PID 2012 wrote to memory of 1188 2012 un214049.exe 29 PID 2012 wrote to memory of 1188 2012 un214049.exe 29 PID 2012 wrote to memory of 1188 2012 un214049.exe 29 PID 2012 wrote to memory of 1188 2012 un214049.exe 29 PID 2012 wrote to memory of 1188 2012 un214049.exe 29 PID 2012 wrote to memory of 1188 2012 un214049.exe 29 PID 2012 wrote to memory of 1188 2012 un214049.exe 29 PID 2012 wrote to memory of 1636 2012 un214049.exe 30 PID 2012 wrote to memory of 1636 2012 un214049.exe 30 PID 2012 wrote to memory of 1636 2012 un214049.exe 30 PID 2012 wrote to memory of 1636 2012 un214049.exe 30 PID 2012 wrote to memory of 1636 2012 un214049.exe 30 PID 2012 wrote to memory of 1636 2012 un214049.exe 30 PID 2012 wrote to memory of 1636 2012 un214049.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe"C:\Users\Admin\AppData\Local\Temp\1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un214049.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un214049.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\93344822.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\93344822.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1188
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk207501.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk207501.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
553KB
MD5e4328d9300ec5d28249e6e0ba3f30eb9
SHA123bcd416b481f881b53d85acb88b81014d031c7a
SHA256c2ddfa10209cd315f346f058484a14a6ee9bc32ebb62a4dc6db6c2b8d9fb5c95
SHA51220badb971ec5eb25fbb75e60fc5cbc727071e06b98fd53e9caed99b8be594ddf09243559a62db4c382f430f99a88d11ea844a9af1ab39de353d068eb4067b065
-
Filesize
553KB
MD5e4328d9300ec5d28249e6e0ba3f30eb9
SHA123bcd416b481f881b53d85acb88b81014d031c7a
SHA256c2ddfa10209cd315f346f058484a14a6ee9bc32ebb62a4dc6db6c2b8d9fb5c95
SHA51220badb971ec5eb25fbb75e60fc5cbc727071e06b98fd53e9caed99b8be594ddf09243559a62db4c382f430f99a88d11ea844a9af1ab39de353d068eb4067b065
-
Filesize
258KB
MD5db910f874c102d6882343c7a16532084
SHA17a3077123f3f7bfd4d1754f1183cac8990f5183d
SHA25629c26c29278d863002e1f57a191befb69955e43f39025d44e36bec6584d6fe24
SHA5129d900b17e69eb55dd9273b76176bd391d47c52277f8308b26ee28f13c9fb9039c5a2d206f1c3eb2ef524ac1bdfc19016d10b0c88b4f777316a0ee0710a044399
-
Filesize
258KB
MD5db910f874c102d6882343c7a16532084
SHA17a3077123f3f7bfd4d1754f1183cac8990f5183d
SHA25629c26c29278d863002e1f57a191befb69955e43f39025d44e36bec6584d6fe24
SHA5129d900b17e69eb55dd9273b76176bd391d47c52277f8308b26ee28f13c9fb9039c5a2d206f1c3eb2ef524ac1bdfc19016d10b0c88b4f777316a0ee0710a044399
-
Filesize
258KB
MD5db910f874c102d6882343c7a16532084
SHA17a3077123f3f7bfd4d1754f1183cac8990f5183d
SHA25629c26c29278d863002e1f57a191befb69955e43f39025d44e36bec6584d6fe24
SHA5129d900b17e69eb55dd9273b76176bd391d47c52277f8308b26ee28f13c9fb9039c5a2d206f1c3eb2ef524ac1bdfc19016d10b0c88b4f777316a0ee0710a044399
-
Filesize
353KB
MD5a64d14f9bf215515c2456977b98a1d98
SHA1ed65b121fef2b10ab434f87e7e96ab3e3ca78057
SHA256004efb3b0aef0991604cf845f8bcb0dafc6afded7aa607cc5c8627397c84232f
SHA512d08bd84b9a776081921486538dd147064898c31d1d0f20b076da85c6f7aeb4b8c21cd3e7dd5d083bd18a98bdaca89d2a7c897f69bfb5bd9bc61cee07aab16d6d
-
Filesize
353KB
MD5a64d14f9bf215515c2456977b98a1d98
SHA1ed65b121fef2b10ab434f87e7e96ab3e3ca78057
SHA256004efb3b0aef0991604cf845f8bcb0dafc6afded7aa607cc5c8627397c84232f
SHA512d08bd84b9a776081921486538dd147064898c31d1d0f20b076da85c6f7aeb4b8c21cd3e7dd5d083bd18a98bdaca89d2a7c897f69bfb5bd9bc61cee07aab16d6d
-
Filesize
353KB
MD5a64d14f9bf215515c2456977b98a1d98
SHA1ed65b121fef2b10ab434f87e7e96ab3e3ca78057
SHA256004efb3b0aef0991604cf845f8bcb0dafc6afded7aa607cc5c8627397c84232f
SHA512d08bd84b9a776081921486538dd147064898c31d1d0f20b076da85c6f7aeb4b8c21cd3e7dd5d083bd18a98bdaca89d2a7c897f69bfb5bd9bc61cee07aab16d6d
-
Filesize
553KB
MD5e4328d9300ec5d28249e6e0ba3f30eb9
SHA123bcd416b481f881b53d85acb88b81014d031c7a
SHA256c2ddfa10209cd315f346f058484a14a6ee9bc32ebb62a4dc6db6c2b8d9fb5c95
SHA51220badb971ec5eb25fbb75e60fc5cbc727071e06b98fd53e9caed99b8be594ddf09243559a62db4c382f430f99a88d11ea844a9af1ab39de353d068eb4067b065
-
Filesize
553KB
MD5e4328d9300ec5d28249e6e0ba3f30eb9
SHA123bcd416b481f881b53d85acb88b81014d031c7a
SHA256c2ddfa10209cd315f346f058484a14a6ee9bc32ebb62a4dc6db6c2b8d9fb5c95
SHA51220badb971ec5eb25fbb75e60fc5cbc727071e06b98fd53e9caed99b8be594ddf09243559a62db4c382f430f99a88d11ea844a9af1ab39de353d068eb4067b065
-
Filesize
258KB
MD5db910f874c102d6882343c7a16532084
SHA17a3077123f3f7bfd4d1754f1183cac8990f5183d
SHA25629c26c29278d863002e1f57a191befb69955e43f39025d44e36bec6584d6fe24
SHA5129d900b17e69eb55dd9273b76176bd391d47c52277f8308b26ee28f13c9fb9039c5a2d206f1c3eb2ef524ac1bdfc19016d10b0c88b4f777316a0ee0710a044399
-
Filesize
258KB
MD5db910f874c102d6882343c7a16532084
SHA17a3077123f3f7bfd4d1754f1183cac8990f5183d
SHA25629c26c29278d863002e1f57a191befb69955e43f39025d44e36bec6584d6fe24
SHA5129d900b17e69eb55dd9273b76176bd391d47c52277f8308b26ee28f13c9fb9039c5a2d206f1c3eb2ef524ac1bdfc19016d10b0c88b4f777316a0ee0710a044399
-
Filesize
258KB
MD5db910f874c102d6882343c7a16532084
SHA17a3077123f3f7bfd4d1754f1183cac8990f5183d
SHA25629c26c29278d863002e1f57a191befb69955e43f39025d44e36bec6584d6fe24
SHA5129d900b17e69eb55dd9273b76176bd391d47c52277f8308b26ee28f13c9fb9039c5a2d206f1c3eb2ef524ac1bdfc19016d10b0c88b4f777316a0ee0710a044399
-
Filesize
353KB
MD5a64d14f9bf215515c2456977b98a1d98
SHA1ed65b121fef2b10ab434f87e7e96ab3e3ca78057
SHA256004efb3b0aef0991604cf845f8bcb0dafc6afded7aa607cc5c8627397c84232f
SHA512d08bd84b9a776081921486538dd147064898c31d1d0f20b076da85c6f7aeb4b8c21cd3e7dd5d083bd18a98bdaca89d2a7c897f69bfb5bd9bc61cee07aab16d6d
-
Filesize
353KB
MD5a64d14f9bf215515c2456977b98a1d98
SHA1ed65b121fef2b10ab434f87e7e96ab3e3ca78057
SHA256004efb3b0aef0991604cf845f8bcb0dafc6afded7aa607cc5c8627397c84232f
SHA512d08bd84b9a776081921486538dd147064898c31d1d0f20b076da85c6f7aeb4b8c21cd3e7dd5d083bd18a98bdaca89d2a7c897f69bfb5bd9bc61cee07aab16d6d
-
Filesize
353KB
MD5a64d14f9bf215515c2456977b98a1d98
SHA1ed65b121fef2b10ab434f87e7e96ab3e3ca78057
SHA256004efb3b0aef0991604cf845f8bcb0dafc6afded7aa607cc5c8627397c84232f
SHA512d08bd84b9a776081921486538dd147064898c31d1d0f20b076da85c6f7aeb4b8c21cd3e7dd5d083bd18a98bdaca89d2a7c897f69bfb5bd9bc61cee07aab16d6d