Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    178s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 21:03

General

  • Target

    27af3faa9b75e9348cb64f222e12763155ef194b7ba10de66a0445594e1eebf3.exe

  • Size

    491KB

  • MD5

    84a2c8c45478367a9461bd236b88e561

  • SHA1

    4e752eaf0d3cd5b1a32571901f4d586802941767

  • SHA256

    27af3faa9b75e9348cb64f222e12763155ef194b7ba10de66a0445594e1eebf3

  • SHA512

    1da02b574e1afc8f3539ab3b5b13a262e3eb64adc4db7b0b2b4b1f2369cd78340a721a01ffccdf592cd39d11f0f7a71a616dd29fb4511540f8af955a2b8c0765

  • SSDEEP

    12288:rMrqy90kcjOLe2jfDhzU+IrOQXJ3agqPn6z0L:dyvceewbhg+fQAf6z0L

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27af3faa9b75e9348cb64f222e12763155ef194b7ba10de66a0445594e1eebf3.exe
    "C:\Users\Admin\AppData\Local\Temp\27af3faa9b75e9348cb64f222e12763155ef194b7ba10de66a0445594e1eebf3.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0114916.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0114916.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o4327791.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o4327791.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:828
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6053242.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6053242.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:296

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0114916.exe

    Filesize

    308KB

    MD5

    cbb2d096c787f9d0512e8948843db742

    SHA1

    0d7e910f5d8ed6f6fe185227f34c985afa42bb84

    SHA256

    d4b7eecdfbb27049cf6b8dc882d0f1c5c804a5ebe413f1f3825fce45f36a5401

    SHA512

    5e8f0dc0096bc97bd2317e5d6075cc49c63dfde7b0f89106f2abb202e63703b3043985af2f025fe6edf348393d1d212d40ba8c54501838295204937575dd7317

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0114916.exe

    Filesize

    308KB

    MD5

    cbb2d096c787f9d0512e8948843db742

    SHA1

    0d7e910f5d8ed6f6fe185227f34c985afa42bb84

    SHA256

    d4b7eecdfbb27049cf6b8dc882d0f1c5c804a5ebe413f1f3825fce45f36a5401

    SHA512

    5e8f0dc0096bc97bd2317e5d6075cc49c63dfde7b0f89106f2abb202e63703b3043985af2f025fe6edf348393d1d212d40ba8c54501838295204937575dd7317

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o4327791.exe

    Filesize

    175KB

    MD5

    8becd60a08b9425130bf835604bc736e

    SHA1

    53b7ef74326db3591a6504b4da064b1a3b1331ff

    SHA256

    73922bdaed94181ebc42c730e20a862c90e979a5356251ed5dc971415f705a7c

    SHA512

    fac94d050c9113eb20a9b2aeda59b2e22e9ce776ccf6319800c00aeeecaea4e5225d6642d4c6ce31194844a330eec018586b81393cf0278fb739b0a4a4696a23

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o4327791.exe

    Filesize

    175KB

    MD5

    8becd60a08b9425130bf835604bc736e

    SHA1

    53b7ef74326db3591a6504b4da064b1a3b1331ff

    SHA256

    73922bdaed94181ebc42c730e20a862c90e979a5356251ed5dc971415f705a7c

    SHA512

    fac94d050c9113eb20a9b2aeda59b2e22e9ce776ccf6319800c00aeeecaea4e5225d6642d4c6ce31194844a330eec018586b81393cf0278fb739b0a4a4696a23

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6053242.exe

    Filesize

    136KB

    MD5

    e6b3415e635e27f7971ba49e6e6ac500

    SHA1

    6c8897aefaf1c9cbdf0b7d5e8384a1d286cc3d1b

    SHA256

    585d2658fa3dfa87d7062e5c5703bca99526d8b91e035716b6e2960bdc1ea6d9

    SHA512

    583fbee0c3395aa94a59b0befb61b6cecc2dc3bf83350f163e98767c6346b48161293a8eab4533aa05a480aadd99b881a9999379d646532a11ab9b31038e0776

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6053242.exe

    Filesize

    136KB

    MD5

    e6b3415e635e27f7971ba49e6e6ac500

    SHA1

    6c8897aefaf1c9cbdf0b7d5e8384a1d286cc3d1b

    SHA256

    585d2658fa3dfa87d7062e5c5703bca99526d8b91e035716b6e2960bdc1ea6d9

    SHA512

    583fbee0c3395aa94a59b0befb61b6cecc2dc3bf83350f163e98767c6346b48161293a8eab4533aa05a480aadd99b881a9999379d646532a11ab9b31038e0776

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0114916.exe

    Filesize

    308KB

    MD5

    cbb2d096c787f9d0512e8948843db742

    SHA1

    0d7e910f5d8ed6f6fe185227f34c985afa42bb84

    SHA256

    d4b7eecdfbb27049cf6b8dc882d0f1c5c804a5ebe413f1f3825fce45f36a5401

    SHA512

    5e8f0dc0096bc97bd2317e5d6075cc49c63dfde7b0f89106f2abb202e63703b3043985af2f025fe6edf348393d1d212d40ba8c54501838295204937575dd7317

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0114916.exe

    Filesize

    308KB

    MD5

    cbb2d096c787f9d0512e8948843db742

    SHA1

    0d7e910f5d8ed6f6fe185227f34c985afa42bb84

    SHA256

    d4b7eecdfbb27049cf6b8dc882d0f1c5c804a5ebe413f1f3825fce45f36a5401

    SHA512

    5e8f0dc0096bc97bd2317e5d6075cc49c63dfde7b0f89106f2abb202e63703b3043985af2f025fe6edf348393d1d212d40ba8c54501838295204937575dd7317

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\o4327791.exe

    Filesize

    175KB

    MD5

    8becd60a08b9425130bf835604bc736e

    SHA1

    53b7ef74326db3591a6504b4da064b1a3b1331ff

    SHA256

    73922bdaed94181ebc42c730e20a862c90e979a5356251ed5dc971415f705a7c

    SHA512

    fac94d050c9113eb20a9b2aeda59b2e22e9ce776ccf6319800c00aeeecaea4e5225d6642d4c6ce31194844a330eec018586b81393cf0278fb739b0a4a4696a23

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\o4327791.exe

    Filesize

    175KB

    MD5

    8becd60a08b9425130bf835604bc736e

    SHA1

    53b7ef74326db3591a6504b4da064b1a3b1331ff

    SHA256

    73922bdaed94181ebc42c730e20a862c90e979a5356251ed5dc971415f705a7c

    SHA512

    fac94d050c9113eb20a9b2aeda59b2e22e9ce776ccf6319800c00aeeecaea4e5225d6642d4c6ce31194844a330eec018586b81393cf0278fb739b0a4a4696a23

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\r6053242.exe

    Filesize

    136KB

    MD5

    e6b3415e635e27f7971ba49e6e6ac500

    SHA1

    6c8897aefaf1c9cbdf0b7d5e8384a1d286cc3d1b

    SHA256

    585d2658fa3dfa87d7062e5c5703bca99526d8b91e035716b6e2960bdc1ea6d9

    SHA512

    583fbee0c3395aa94a59b0befb61b6cecc2dc3bf83350f163e98767c6346b48161293a8eab4533aa05a480aadd99b881a9999379d646532a11ab9b31038e0776

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\r6053242.exe

    Filesize

    136KB

    MD5

    e6b3415e635e27f7971ba49e6e6ac500

    SHA1

    6c8897aefaf1c9cbdf0b7d5e8384a1d286cc3d1b

    SHA256

    585d2658fa3dfa87d7062e5c5703bca99526d8b91e035716b6e2960bdc1ea6d9

    SHA512

    583fbee0c3395aa94a59b0befb61b6cecc2dc3bf83350f163e98767c6346b48161293a8eab4533aa05a480aadd99b881a9999379d646532a11ab9b31038e0776

  • memory/296-113-0x0000000000A70000-0x0000000000A98000-memory.dmp

    Filesize

    160KB

  • memory/296-114-0x0000000006F00000-0x0000000006F40000-memory.dmp

    Filesize

    256KB

  • memory/296-115-0x0000000006F00000-0x0000000006F40000-memory.dmp

    Filesize

    256KB

  • memory/828-87-0x0000000002270000-0x0000000002282000-memory.dmp

    Filesize

    72KB

  • memory/828-103-0x0000000002270000-0x0000000002282000-memory.dmp

    Filesize

    72KB

  • memory/828-89-0x0000000002270000-0x0000000002282000-memory.dmp

    Filesize

    72KB

  • memory/828-91-0x0000000002270000-0x0000000002282000-memory.dmp

    Filesize

    72KB

  • memory/828-93-0x0000000002270000-0x0000000002282000-memory.dmp

    Filesize

    72KB

  • memory/828-95-0x0000000002270000-0x0000000002282000-memory.dmp

    Filesize

    72KB

  • memory/828-97-0x0000000002270000-0x0000000002282000-memory.dmp

    Filesize

    72KB

  • memory/828-99-0x0000000002270000-0x0000000002282000-memory.dmp

    Filesize

    72KB

  • memory/828-101-0x0000000002270000-0x0000000002282000-memory.dmp

    Filesize

    72KB

  • memory/828-85-0x0000000002270000-0x0000000002282000-memory.dmp

    Filesize

    72KB

  • memory/828-105-0x0000000002120000-0x0000000002160000-memory.dmp

    Filesize

    256KB

  • memory/828-104-0x0000000002120000-0x0000000002160000-memory.dmp

    Filesize

    256KB

  • memory/828-106-0x0000000002120000-0x0000000002160000-memory.dmp

    Filesize

    256KB

  • memory/828-83-0x0000000002270000-0x0000000002282000-memory.dmp

    Filesize

    72KB

  • memory/828-79-0x0000000002270000-0x0000000002282000-memory.dmp

    Filesize

    72KB

  • memory/828-81-0x0000000002270000-0x0000000002282000-memory.dmp

    Filesize

    72KB

  • memory/828-77-0x0000000002270000-0x0000000002282000-memory.dmp

    Filesize

    72KB

  • memory/828-76-0x0000000002270000-0x0000000002282000-memory.dmp

    Filesize

    72KB

  • memory/828-75-0x0000000002270000-0x0000000002288000-memory.dmp

    Filesize

    96KB

  • memory/828-74-0x00000000003E0000-0x00000000003FA000-memory.dmp

    Filesize

    104KB