Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
268s -
max time network
276s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
11/07/2023, 23:57
Static task
static1
Behavioral task
behavioral1
Sample
y6836522.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
y6836522.exe
Resource
win10-20230703-en
General
-
Target
y6836522.exe
-
Size
863KB
-
MD5
b6892af7074185fcf0259e7c20f8616e
-
SHA1
f76448c4fb6bdd7427ce40ef0eec1937b4514734
-
SHA256
f6fc3d5332537df9f31ed5f91fda53a6cc2d08ca69958b4f9982f20398365c80
-
SHA512
a414e0e23a1c31501d9d73850aa5a04d0be0f488a3a76d6b3cbc72a8a554191422ddc3436d5b389224f9d78bf66cafc044ca53b480a4ac36038042f4a725d5df
-
SSDEEP
12288:gMr5y90alkBjdp9sU3ojZ8Gf5jb6eoYcD8eMxswF4IDAg1UZYyGlaqFF/xFEFHrZ:pyRkBjdnx3+jRP68tF49YsaTE/
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/2976-132-0x00000000001D0000-0x00000000001DA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k3913104.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k3913104.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k3913104.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k3913104.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k3913104.exe -
Executes dropped EXE 3 IoCs
pid Process 1548 y8805359.exe 2976 k3913104.exe 756 l1635494.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k3913104.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k3913104.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8805359.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8805359.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y6836522.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" y6836522.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1616 756 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2976 k3913104.exe 2976 k3913104.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2976 k3913104.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2380 wrote to memory of 1548 2380 y6836522.exe 70 PID 2380 wrote to memory of 1548 2380 y6836522.exe 70 PID 2380 wrote to memory of 1548 2380 y6836522.exe 70 PID 1548 wrote to memory of 2976 1548 y8805359.exe 71 PID 1548 wrote to memory of 2976 1548 y8805359.exe 71 PID 1548 wrote to memory of 2976 1548 y8805359.exe 71 PID 1548 wrote to memory of 756 1548 y8805359.exe 73 PID 1548 wrote to memory of 756 1548 y8805359.exe 73 PID 1548 wrote to memory of 756 1548 y8805359.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\y6836522.exe"C:\Users\Admin\AppData\Local\Temp\y6836522.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8805359.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8805359.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3913104.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3913104.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1635494.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1635494.exe3⤵
- Executes dropped EXE
PID:756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 756 -s 5804⤵
- Program crash
PID:1616
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
680KB
MD5056943d59d1e91dddef3ce2e6c71d720
SHA106c83a316960184806ec191720887efa33eeb19f
SHA256979da931d446ec6ee669695326f3000c87cf226802899331f68176655b10db87
SHA512357cc03045de200a9459c3216255ba00491290b851f8fd9e05e751e9e5698539abc23186905800080a2ba4a9a54a40a85da38510fca85ac575ba016fab81d517
-
Filesize
680KB
MD5056943d59d1e91dddef3ce2e6c71d720
SHA106c83a316960184806ec191720887efa33eeb19f
SHA256979da931d446ec6ee669695326f3000c87cf226802899331f68176655b10db87
SHA512357cc03045de200a9459c3216255ba00491290b851f8fd9e05e751e9e5698539abc23186905800080a2ba4a9a54a40a85da38510fca85ac575ba016fab81d517
-
Filesize
530KB
MD5242560722e7846feaf218cdfaadce3b8
SHA11e1a32c2285adaa01f35c418a50306ed4a3d755d
SHA2566a6008a217e120313b7f482e6b53676df300e03fac9780d29d648fd0ef1e7d5e
SHA512a67ce6bca8aa2adc664e6f1cbde285b47a3d702014f554bbf5238e4841efd27d99eb702c2edec0945960c8cabd3a1947033e06b6d8b92dc28acd42ebf7b718c0
-
Filesize
530KB
MD5242560722e7846feaf218cdfaadce3b8
SHA11e1a32c2285adaa01f35c418a50306ed4a3d755d
SHA2566a6008a217e120313b7f482e6b53676df300e03fac9780d29d648fd0ef1e7d5e
SHA512a67ce6bca8aa2adc664e6f1cbde285b47a3d702014f554bbf5238e4841efd27d99eb702c2edec0945960c8cabd3a1947033e06b6d8b92dc28acd42ebf7b718c0
-
Filesize
692KB
MD584de04ec82124de82c84b3a3315e0624
SHA170b4ecc883c09549219e6a4486cf73f46762b9ce
SHA25697aff727dfe741c441e8c86e7b746a045ead7f66b2d28756d6837bde4b5f4ae3
SHA51254e814074613aa66243aea9c0c581060bb80207cd6382005ab2007fad8d88700adc1986be5ca851023e66024f74b62566a4b3e9c7f96a685c7bb3031dd6386c3
-
Filesize
692KB
MD584de04ec82124de82c84b3a3315e0624
SHA170b4ecc883c09549219e6a4486cf73f46762b9ce
SHA25697aff727dfe741c441e8c86e7b746a045ead7f66b2d28756d6837bde4b5f4ae3
SHA51254e814074613aa66243aea9c0c581060bb80207cd6382005ab2007fad8d88700adc1986be5ca851023e66024f74b62566a4b3e9c7f96a685c7bb3031dd6386c3