Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
231s -
max time network
316s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:06
Static task
static1
Behavioral task
behavioral1
Sample
2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe
Resource
win10v2004-20230220-en
General
-
Target
2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe
-
Size
695KB
-
MD5
d45f82b98272f1cedb01c2faf5a6de4f
-
SHA1
6ca6384694b516fe144ea4991952acf8f4910b7b
-
SHA256
2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840
-
SHA512
1e497c4547ef13875513d06d734ab7ea1d7cae6dac11abe6d78018c8096c7be0814e7d675cdbdc0bd1110969a166d9baa16ae89b0b3cdba69e6dc7cc114881e2
-
SSDEEP
12288:py90Z9lRphVbwhekrNN2Yl9jA6rwTwa6F3VGmUL5vleu2Kh+T1ZgKs:pyYlAheUNNPl9j5ZVGmUzWKh+T1s
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 94557299.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 94557299.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 94557299.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 94557299.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 94557299.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 94557299.exe -
Executes dropped EXE 3 IoCs
pid Process 1060 un738904.exe 2016 94557299.exe 1368 rk697725.exe -
Loads dropped DLL 8 IoCs
pid Process 2012 2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe 1060 un738904.exe 1060 un738904.exe 1060 un738904.exe 2016 94557299.exe 1060 un738904.exe 1060 un738904.exe 1368 rk697725.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 94557299.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 94557299.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un738904.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un738904.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2016 94557299.exe 2016 94557299.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2016 94557299.exe Token: SeDebugPrivilege 1368 rk697725.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1060 2012 2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe 28 PID 2012 wrote to memory of 1060 2012 2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe 28 PID 2012 wrote to memory of 1060 2012 2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe 28 PID 2012 wrote to memory of 1060 2012 2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe 28 PID 2012 wrote to memory of 1060 2012 2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe 28 PID 2012 wrote to memory of 1060 2012 2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe 28 PID 2012 wrote to memory of 1060 2012 2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe 28 PID 1060 wrote to memory of 2016 1060 un738904.exe 29 PID 1060 wrote to memory of 2016 1060 un738904.exe 29 PID 1060 wrote to memory of 2016 1060 un738904.exe 29 PID 1060 wrote to memory of 2016 1060 un738904.exe 29 PID 1060 wrote to memory of 2016 1060 un738904.exe 29 PID 1060 wrote to memory of 2016 1060 un738904.exe 29 PID 1060 wrote to memory of 2016 1060 un738904.exe 29 PID 1060 wrote to memory of 1368 1060 un738904.exe 30 PID 1060 wrote to memory of 1368 1060 un738904.exe 30 PID 1060 wrote to memory of 1368 1060 un738904.exe 30 PID 1060 wrote to memory of 1368 1060 un738904.exe 30 PID 1060 wrote to memory of 1368 1060 un738904.exe 30 PID 1060 wrote to memory of 1368 1060 un738904.exe 30 PID 1060 wrote to memory of 1368 1060 un738904.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe"C:\Users\Admin\AppData\Local\Temp\2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un738904.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un738904.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\94557299.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\94557299.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk697725.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk697725.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541KB
MD57753cb8ef538cf99a49af6a636a60280
SHA17805bc4a3d701a1debce327dfcdedad1f42a3b4b
SHA256b481a2ef5ba5762f882abf438ae6c7da8933b81ff8df34a6ef0efb52d2e6bd5e
SHA512a5ce627102367ac7ca898329a289f6a76317ca01f8569b0080b0eb5404d232dc1f49a2e0f9bf9a86f8f1b6a984db67294991971f2cfb0bff38e4f62e80087aad
-
Filesize
541KB
MD57753cb8ef538cf99a49af6a636a60280
SHA17805bc4a3d701a1debce327dfcdedad1f42a3b4b
SHA256b481a2ef5ba5762f882abf438ae6c7da8933b81ff8df34a6ef0efb52d2e6bd5e
SHA512a5ce627102367ac7ca898329a289f6a76317ca01f8569b0080b0eb5404d232dc1f49a2e0f9bf9a86f8f1b6a984db67294991971f2cfb0bff38e4f62e80087aad
-
Filesize
257KB
MD5b68748f8358a0a693b9640689528e0ad
SHA1e1e0c8fd713e42b3e04d8cad5f40643aaec53cbb
SHA2563182ad0fc202219e8f94c4c7ceb6467d0b1b1e53c88eae4a11290ef14a555250
SHA5127a6cfdec03535855a5565294d851fd79d62cd4915ec9f4b1e97b70cc65a28f457b4b7c1973ceb7dfc6617a664d488dc015bb3eee4c4067ff20226779fba80875
-
Filesize
257KB
MD5b68748f8358a0a693b9640689528e0ad
SHA1e1e0c8fd713e42b3e04d8cad5f40643aaec53cbb
SHA2563182ad0fc202219e8f94c4c7ceb6467d0b1b1e53c88eae4a11290ef14a555250
SHA5127a6cfdec03535855a5565294d851fd79d62cd4915ec9f4b1e97b70cc65a28f457b4b7c1973ceb7dfc6617a664d488dc015bb3eee4c4067ff20226779fba80875
-
Filesize
257KB
MD5b68748f8358a0a693b9640689528e0ad
SHA1e1e0c8fd713e42b3e04d8cad5f40643aaec53cbb
SHA2563182ad0fc202219e8f94c4c7ceb6467d0b1b1e53c88eae4a11290ef14a555250
SHA5127a6cfdec03535855a5565294d851fd79d62cd4915ec9f4b1e97b70cc65a28f457b4b7c1973ceb7dfc6617a664d488dc015bb3eee4c4067ff20226779fba80875
-
Filesize
340KB
MD5ecb52039e10e634af1e0d00366732f30
SHA1eca73fb0fb0a0e25b235ff2b95a8aab48d6564ac
SHA256b3b174cbb21ed0cb5ec0f478b96a26b15144192d353de3954bbf41718d5ee6cf
SHA5121632848839569ae788919fffc73dc4e9be9e009f1194f4c4fd4227bb9d8e1d758df462dec288049c6847e4f957203c8c05bac2355a2c3ddb741053d35826daf0
-
Filesize
340KB
MD5ecb52039e10e634af1e0d00366732f30
SHA1eca73fb0fb0a0e25b235ff2b95a8aab48d6564ac
SHA256b3b174cbb21ed0cb5ec0f478b96a26b15144192d353de3954bbf41718d5ee6cf
SHA5121632848839569ae788919fffc73dc4e9be9e009f1194f4c4fd4227bb9d8e1d758df462dec288049c6847e4f957203c8c05bac2355a2c3ddb741053d35826daf0
-
Filesize
340KB
MD5ecb52039e10e634af1e0d00366732f30
SHA1eca73fb0fb0a0e25b235ff2b95a8aab48d6564ac
SHA256b3b174cbb21ed0cb5ec0f478b96a26b15144192d353de3954bbf41718d5ee6cf
SHA5121632848839569ae788919fffc73dc4e9be9e009f1194f4c4fd4227bb9d8e1d758df462dec288049c6847e4f957203c8c05bac2355a2c3ddb741053d35826daf0
-
Filesize
541KB
MD57753cb8ef538cf99a49af6a636a60280
SHA17805bc4a3d701a1debce327dfcdedad1f42a3b4b
SHA256b481a2ef5ba5762f882abf438ae6c7da8933b81ff8df34a6ef0efb52d2e6bd5e
SHA512a5ce627102367ac7ca898329a289f6a76317ca01f8569b0080b0eb5404d232dc1f49a2e0f9bf9a86f8f1b6a984db67294991971f2cfb0bff38e4f62e80087aad
-
Filesize
541KB
MD57753cb8ef538cf99a49af6a636a60280
SHA17805bc4a3d701a1debce327dfcdedad1f42a3b4b
SHA256b481a2ef5ba5762f882abf438ae6c7da8933b81ff8df34a6ef0efb52d2e6bd5e
SHA512a5ce627102367ac7ca898329a289f6a76317ca01f8569b0080b0eb5404d232dc1f49a2e0f9bf9a86f8f1b6a984db67294991971f2cfb0bff38e4f62e80087aad
-
Filesize
257KB
MD5b68748f8358a0a693b9640689528e0ad
SHA1e1e0c8fd713e42b3e04d8cad5f40643aaec53cbb
SHA2563182ad0fc202219e8f94c4c7ceb6467d0b1b1e53c88eae4a11290ef14a555250
SHA5127a6cfdec03535855a5565294d851fd79d62cd4915ec9f4b1e97b70cc65a28f457b4b7c1973ceb7dfc6617a664d488dc015bb3eee4c4067ff20226779fba80875
-
Filesize
257KB
MD5b68748f8358a0a693b9640689528e0ad
SHA1e1e0c8fd713e42b3e04d8cad5f40643aaec53cbb
SHA2563182ad0fc202219e8f94c4c7ceb6467d0b1b1e53c88eae4a11290ef14a555250
SHA5127a6cfdec03535855a5565294d851fd79d62cd4915ec9f4b1e97b70cc65a28f457b4b7c1973ceb7dfc6617a664d488dc015bb3eee4c4067ff20226779fba80875
-
Filesize
257KB
MD5b68748f8358a0a693b9640689528e0ad
SHA1e1e0c8fd713e42b3e04d8cad5f40643aaec53cbb
SHA2563182ad0fc202219e8f94c4c7ceb6467d0b1b1e53c88eae4a11290ef14a555250
SHA5127a6cfdec03535855a5565294d851fd79d62cd4915ec9f4b1e97b70cc65a28f457b4b7c1973ceb7dfc6617a664d488dc015bb3eee4c4067ff20226779fba80875
-
Filesize
340KB
MD5ecb52039e10e634af1e0d00366732f30
SHA1eca73fb0fb0a0e25b235ff2b95a8aab48d6564ac
SHA256b3b174cbb21ed0cb5ec0f478b96a26b15144192d353de3954bbf41718d5ee6cf
SHA5121632848839569ae788919fffc73dc4e9be9e009f1194f4c4fd4227bb9d8e1d758df462dec288049c6847e4f957203c8c05bac2355a2c3ddb741053d35826daf0
-
Filesize
340KB
MD5ecb52039e10e634af1e0d00366732f30
SHA1eca73fb0fb0a0e25b235ff2b95a8aab48d6564ac
SHA256b3b174cbb21ed0cb5ec0f478b96a26b15144192d353de3954bbf41718d5ee6cf
SHA5121632848839569ae788919fffc73dc4e9be9e009f1194f4c4fd4227bb9d8e1d758df462dec288049c6847e4f957203c8c05bac2355a2c3ddb741053d35826daf0
-
Filesize
340KB
MD5ecb52039e10e634af1e0d00366732f30
SHA1eca73fb0fb0a0e25b235ff2b95a8aab48d6564ac
SHA256b3b174cbb21ed0cb5ec0f478b96a26b15144192d353de3954bbf41718d5ee6cf
SHA5121632848839569ae788919fffc73dc4e9be9e009f1194f4c4fd4227bb9d8e1d758df462dec288049c6847e4f957203c8c05bac2355a2c3ddb741053d35826daf0