Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    172s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 20:52

General

  • Target

    1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe

  • Size

    707KB

  • MD5

    982a5fdc6779e4491d9a42aced94632d

  • SHA1

    e4b5f1b040df9232e9a1210ba19df9684b4af431

  • SHA256

    1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7

  • SHA512

    dd5876ab60345c2654011c15b5b3956f4c2cbe83bbd0bcce7ee75d978d1ab237bd0a05e8c34907e94b88c52211b4cb75260a8e5577c797c5d5793f42939e0be4

  • SSDEEP

    12288:Jy90R4cYuZUSZinTLlcNfgXxGk0STEn3OmYOIDA6kk/Ee4rY:JykvZUSZinTxcNfghGDV3CHYkEE

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe
    "C:\Users\Admin\AppData\Local\Temp\1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un214049.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un214049.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\93344822.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\93344822.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1188
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk207501.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk207501.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1636

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un214049.exe

    Filesize

    553KB

    MD5

    e4328d9300ec5d28249e6e0ba3f30eb9

    SHA1

    23bcd416b481f881b53d85acb88b81014d031c7a

    SHA256

    c2ddfa10209cd315f346f058484a14a6ee9bc32ebb62a4dc6db6c2b8d9fb5c95

    SHA512

    20badb971ec5eb25fbb75e60fc5cbc727071e06b98fd53e9caed99b8be594ddf09243559a62db4c382f430f99a88d11ea844a9af1ab39de353d068eb4067b065

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un214049.exe

    Filesize

    553KB

    MD5

    e4328d9300ec5d28249e6e0ba3f30eb9

    SHA1

    23bcd416b481f881b53d85acb88b81014d031c7a

    SHA256

    c2ddfa10209cd315f346f058484a14a6ee9bc32ebb62a4dc6db6c2b8d9fb5c95

    SHA512

    20badb971ec5eb25fbb75e60fc5cbc727071e06b98fd53e9caed99b8be594ddf09243559a62db4c382f430f99a88d11ea844a9af1ab39de353d068eb4067b065

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\93344822.exe

    Filesize

    258KB

    MD5

    db910f874c102d6882343c7a16532084

    SHA1

    7a3077123f3f7bfd4d1754f1183cac8990f5183d

    SHA256

    29c26c29278d863002e1f57a191befb69955e43f39025d44e36bec6584d6fe24

    SHA512

    9d900b17e69eb55dd9273b76176bd391d47c52277f8308b26ee28f13c9fb9039c5a2d206f1c3eb2ef524ac1bdfc19016d10b0c88b4f777316a0ee0710a044399

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\93344822.exe

    Filesize

    258KB

    MD5

    db910f874c102d6882343c7a16532084

    SHA1

    7a3077123f3f7bfd4d1754f1183cac8990f5183d

    SHA256

    29c26c29278d863002e1f57a191befb69955e43f39025d44e36bec6584d6fe24

    SHA512

    9d900b17e69eb55dd9273b76176bd391d47c52277f8308b26ee28f13c9fb9039c5a2d206f1c3eb2ef524ac1bdfc19016d10b0c88b4f777316a0ee0710a044399

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\93344822.exe

    Filesize

    258KB

    MD5

    db910f874c102d6882343c7a16532084

    SHA1

    7a3077123f3f7bfd4d1754f1183cac8990f5183d

    SHA256

    29c26c29278d863002e1f57a191befb69955e43f39025d44e36bec6584d6fe24

    SHA512

    9d900b17e69eb55dd9273b76176bd391d47c52277f8308b26ee28f13c9fb9039c5a2d206f1c3eb2ef524ac1bdfc19016d10b0c88b4f777316a0ee0710a044399

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk207501.exe

    Filesize

    353KB

    MD5

    a64d14f9bf215515c2456977b98a1d98

    SHA1

    ed65b121fef2b10ab434f87e7e96ab3e3ca78057

    SHA256

    004efb3b0aef0991604cf845f8bcb0dafc6afded7aa607cc5c8627397c84232f

    SHA512

    d08bd84b9a776081921486538dd147064898c31d1d0f20b076da85c6f7aeb4b8c21cd3e7dd5d083bd18a98bdaca89d2a7c897f69bfb5bd9bc61cee07aab16d6d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk207501.exe

    Filesize

    353KB

    MD5

    a64d14f9bf215515c2456977b98a1d98

    SHA1

    ed65b121fef2b10ab434f87e7e96ab3e3ca78057

    SHA256

    004efb3b0aef0991604cf845f8bcb0dafc6afded7aa607cc5c8627397c84232f

    SHA512

    d08bd84b9a776081921486538dd147064898c31d1d0f20b076da85c6f7aeb4b8c21cd3e7dd5d083bd18a98bdaca89d2a7c897f69bfb5bd9bc61cee07aab16d6d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk207501.exe

    Filesize

    353KB

    MD5

    a64d14f9bf215515c2456977b98a1d98

    SHA1

    ed65b121fef2b10ab434f87e7e96ab3e3ca78057

    SHA256

    004efb3b0aef0991604cf845f8bcb0dafc6afded7aa607cc5c8627397c84232f

    SHA512

    d08bd84b9a776081921486538dd147064898c31d1d0f20b076da85c6f7aeb4b8c21cd3e7dd5d083bd18a98bdaca89d2a7c897f69bfb5bd9bc61cee07aab16d6d

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un214049.exe

    Filesize

    553KB

    MD5

    e4328d9300ec5d28249e6e0ba3f30eb9

    SHA1

    23bcd416b481f881b53d85acb88b81014d031c7a

    SHA256

    c2ddfa10209cd315f346f058484a14a6ee9bc32ebb62a4dc6db6c2b8d9fb5c95

    SHA512

    20badb971ec5eb25fbb75e60fc5cbc727071e06b98fd53e9caed99b8be594ddf09243559a62db4c382f430f99a88d11ea844a9af1ab39de353d068eb4067b065

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un214049.exe

    Filesize

    553KB

    MD5

    e4328d9300ec5d28249e6e0ba3f30eb9

    SHA1

    23bcd416b481f881b53d85acb88b81014d031c7a

    SHA256

    c2ddfa10209cd315f346f058484a14a6ee9bc32ebb62a4dc6db6c2b8d9fb5c95

    SHA512

    20badb971ec5eb25fbb75e60fc5cbc727071e06b98fd53e9caed99b8be594ddf09243559a62db4c382f430f99a88d11ea844a9af1ab39de353d068eb4067b065

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\93344822.exe

    Filesize

    258KB

    MD5

    db910f874c102d6882343c7a16532084

    SHA1

    7a3077123f3f7bfd4d1754f1183cac8990f5183d

    SHA256

    29c26c29278d863002e1f57a191befb69955e43f39025d44e36bec6584d6fe24

    SHA512

    9d900b17e69eb55dd9273b76176bd391d47c52277f8308b26ee28f13c9fb9039c5a2d206f1c3eb2ef524ac1bdfc19016d10b0c88b4f777316a0ee0710a044399

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\93344822.exe

    Filesize

    258KB

    MD5

    db910f874c102d6882343c7a16532084

    SHA1

    7a3077123f3f7bfd4d1754f1183cac8990f5183d

    SHA256

    29c26c29278d863002e1f57a191befb69955e43f39025d44e36bec6584d6fe24

    SHA512

    9d900b17e69eb55dd9273b76176bd391d47c52277f8308b26ee28f13c9fb9039c5a2d206f1c3eb2ef524ac1bdfc19016d10b0c88b4f777316a0ee0710a044399

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\93344822.exe

    Filesize

    258KB

    MD5

    db910f874c102d6882343c7a16532084

    SHA1

    7a3077123f3f7bfd4d1754f1183cac8990f5183d

    SHA256

    29c26c29278d863002e1f57a191befb69955e43f39025d44e36bec6584d6fe24

    SHA512

    9d900b17e69eb55dd9273b76176bd391d47c52277f8308b26ee28f13c9fb9039c5a2d206f1c3eb2ef524ac1bdfc19016d10b0c88b4f777316a0ee0710a044399

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk207501.exe

    Filesize

    353KB

    MD5

    a64d14f9bf215515c2456977b98a1d98

    SHA1

    ed65b121fef2b10ab434f87e7e96ab3e3ca78057

    SHA256

    004efb3b0aef0991604cf845f8bcb0dafc6afded7aa607cc5c8627397c84232f

    SHA512

    d08bd84b9a776081921486538dd147064898c31d1d0f20b076da85c6f7aeb4b8c21cd3e7dd5d083bd18a98bdaca89d2a7c897f69bfb5bd9bc61cee07aab16d6d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk207501.exe

    Filesize

    353KB

    MD5

    a64d14f9bf215515c2456977b98a1d98

    SHA1

    ed65b121fef2b10ab434f87e7e96ab3e3ca78057

    SHA256

    004efb3b0aef0991604cf845f8bcb0dafc6afded7aa607cc5c8627397c84232f

    SHA512

    d08bd84b9a776081921486538dd147064898c31d1d0f20b076da85c6f7aeb4b8c21cd3e7dd5d083bd18a98bdaca89d2a7c897f69bfb5bd9bc61cee07aab16d6d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk207501.exe

    Filesize

    353KB

    MD5

    a64d14f9bf215515c2456977b98a1d98

    SHA1

    ed65b121fef2b10ab434f87e7e96ab3e3ca78057

    SHA256

    004efb3b0aef0991604cf845f8bcb0dafc6afded7aa607cc5c8627397c84232f

    SHA512

    d08bd84b9a776081921486538dd147064898c31d1d0f20b076da85c6f7aeb4b8c21cd3e7dd5d083bd18a98bdaca89d2a7c897f69bfb5bd9bc61cee07aab16d6d

  • memory/1188-115-0x00000000002A0000-0x00000000002CD000-memory.dmp

    Filesize

    180KB

  • memory/1188-87-0x0000000004880000-0x0000000004893000-memory.dmp

    Filesize

    76KB

  • memory/1188-88-0x0000000004880000-0x0000000004893000-memory.dmp

    Filesize

    76KB

  • memory/1188-98-0x0000000004880000-0x0000000004893000-memory.dmp

    Filesize

    76KB

  • memory/1188-96-0x0000000004880000-0x0000000004893000-memory.dmp

    Filesize

    76KB

  • memory/1188-94-0x0000000004880000-0x0000000004893000-memory.dmp

    Filesize

    76KB

  • memory/1188-92-0x0000000004880000-0x0000000004893000-memory.dmp

    Filesize

    76KB

  • memory/1188-100-0x0000000004880000-0x0000000004893000-memory.dmp

    Filesize

    76KB

  • memory/1188-114-0x0000000004880000-0x0000000004893000-memory.dmp

    Filesize

    76KB

  • memory/1188-112-0x0000000004880000-0x0000000004893000-memory.dmp

    Filesize

    76KB

  • memory/1188-110-0x0000000004880000-0x0000000004893000-memory.dmp

    Filesize

    76KB

  • memory/1188-108-0x0000000004880000-0x0000000004893000-memory.dmp

    Filesize

    76KB

  • memory/1188-106-0x0000000004880000-0x0000000004893000-memory.dmp

    Filesize

    76KB

  • memory/1188-104-0x0000000004880000-0x0000000004893000-memory.dmp

    Filesize

    76KB

  • memory/1188-102-0x0000000004880000-0x0000000004893000-memory.dmp

    Filesize

    76KB

  • memory/1188-90-0x0000000004880000-0x0000000004893000-memory.dmp

    Filesize

    76KB

  • memory/1188-86-0x0000000004880000-0x0000000004898000-memory.dmp

    Filesize

    96KB

  • memory/1188-119-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/1188-84-0x0000000007170000-0x00000000071B0000-memory.dmp

    Filesize

    256KB

  • memory/1188-85-0x0000000007170000-0x00000000071B0000-memory.dmp

    Filesize

    256KB

  • memory/1188-83-0x0000000002C80000-0x0000000002C9A000-memory.dmp

    Filesize

    104KB

  • memory/1188-81-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/1188-79-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/1188-78-0x00000000002A0000-0x00000000002CD000-memory.dmp

    Filesize

    180KB

  • memory/1636-131-0x0000000003370000-0x00000000033AA000-memory.dmp

    Filesize

    232KB

  • memory/1636-152-0x0000000000240000-0x0000000000286000-memory.dmp

    Filesize

    280KB

  • memory/1636-132-0x0000000003370000-0x00000000033A5000-memory.dmp

    Filesize

    212KB

  • memory/1636-133-0x0000000003370000-0x00000000033A5000-memory.dmp

    Filesize

    212KB

  • memory/1636-135-0x0000000003370000-0x00000000033A5000-memory.dmp

    Filesize

    212KB

  • memory/1636-137-0x0000000003370000-0x00000000033A5000-memory.dmp

    Filesize

    212KB

  • memory/1636-139-0x0000000003370000-0x00000000033A5000-memory.dmp

    Filesize

    212KB

  • memory/1636-141-0x0000000003370000-0x00000000033A5000-memory.dmp

    Filesize

    212KB

  • memory/1636-143-0x0000000003370000-0x00000000033A5000-memory.dmp

    Filesize

    212KB

  • memory/1636-147-0x0000000003370000-0x00000000033A5000-memory.dmp

    Filesize

    212KB

  • memory/1636-149-0x0000000003370000-0x00000000033A5000-memory.dmp

    Filesize

    212KB

  • memory/1636-145-0x0000000003370000-0x00000000033A5000-memory.dmp

    Filesize

    212KB

  • memory/1636-151-0x0000000003370000-0x00000000033A5000-memory.dmp

    Filesize

    212KB

  • memory/1636-130-0x0000000003200000-0x000000000323C000-memory.dmp

    Filesize

    240KB

  • memory/1636-155-0x0000000007380000-0x00000000073C0000-memory.dmp

    Filesize

    256KB

  • memory/1636-157-0x0000000007380000-0x00000000073C0000-memory.dmp

    Filesize

    256KB

  • memory/1636-159-0x0000000007380000-0x00000000073C0000-memory.dmp

    Filesize

    256KB

  • memory/1636-158-0x0000000003370000-0x00000000033A5000-memory.dmp

    Filesize

    212KB

  • memory/1636-154-0x0000000003370000-0x00000000033A5000-memory.dmp

    Filesize

    212KB

  • memory/1636-161-0x0000000003370000-0x00000000033A5000-memory.dmp

    Filesize

    212KB

  • memory/1636-163-0x0000000003370000-0x00000000033A5000-memory.dmp

    Filesize

    212KB

  • memory/1636-929-0x0000000007380000-0x00000000073C0000-memory.dmp

    Filesize

    256KB

  • memory/1636-930-0x0000000007380000-0x00000000073C0000-memory.dmp

    Filesize

    256KB

  • memory/1636-931-0x0000000007380000-0x00000000073C0000-memory.dmp

    Filesize

    256KB

  • memory/1636-932-0x0000000007380000-0x00000000073C0000-memory.dmp

    Filesize

    256KB

  • memory/1636-934-0x0000000007380000-0x00000000073C0000-memory.dmp

    Filesize

    256KB