Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10/10/2023, 11:39

General

  • Target

    file.exe

  • Size

    1.2MB

  • MD5

    768ea902b8a19de2479cefe8ee38ab5b

  • SHA1

    f422ee01f7cc935f68a8d4718c4fc01a8fb78972

  • SHA256

    f29f199df3da80d14283b9ab186ab9515221b10d917319f0cc3c27e09330c5f3

  • SHA512

    f43ced8dcc3fd999feb514fdca3ed3a782421e3c836c278fe33c7a66188e4a0f71f6a78317ea0699aab8be9b5b5aba61ae9a0ee838eebdc742e28d77f8d7aa91

  • SSDEEP

    24576:nyiHHhbGu/cb7n7AG2Amah8Qaf24x5KXYmGbd4cAYAn:yihb9+0G2A5h8QafvXcRGO0

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2812
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za6up07.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za6up07.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wj7cP36.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wj7cP36.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\EP7BG61.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\EP7BG61.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2632
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1RE40cp9.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1RE40cp9.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1720
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2gS8319.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2gS8319.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2556
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1404
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1404 -s 268
                7⤵
                • Program crash
                PID:760
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za6up07.exe

    Filesize

    1.0MB

    MD5

    5f6f2e90497891c3e2a4a5659fc6ec10

    SHA1

    e9d66d8765a11ac1aa96c6272bbb165978359b8b

    SHA256

    e2188146b25739570613fb57161003ab8ce3dfd4111d119e723ab27615dec20f

    SHA512

    6837d97a550d2d867f90f39b5ee8e3b6e4b367f8661cd0f48d4c7f39b8bc540e2ac407296066577e950ddb90ee8a391785c8f3f2dac62b8a689c1408136da861

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za6up07.exe

    Filesize

    1.0MB

    MD5

    5f6f2e90497891c3e2a4a5659fc6ec10

    SHA1

    e9d66d8765a11ac1aa96c6272bbb165978359b8b

    SHA256

    e2188146b25739570613fb57161003ab8ce3dfd4111d119e723ab27615dec20f

    SHA512

    6837d97a550d2d867f90f39b5ee8e3b6e4b367f8661cd0f48d4c7f39b8bc540e2ac407296066577e950ddb90ee8a391785c8f3f2dac62b8a689c1408136da861

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wj7cP36.exe

    Filesize

    744KB

    MD5

    0f45f794a6725a0f950c0ed7e15d0fd8

    SHA1

    aa1f7d406e748457b0d0ff383387eeeb7709dbba

    SHA256

    f8a32f3d67b2d962a15f1df2e4553ae1a57edae0ae9c626beed6b127b497834a

    SHA512

    c62740744e38ab25674d3d832e9e7bcb9c2c4e3e8c848df8549bf717aa661b216824a654a5bea91dba42353ba109ee3a59115fc502aa7ada802ce066f0273085

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wj7cP36.exe

    Filesize

    744KB

    MD5

    0f45f794a6725a0f950c0ed7e15d0fd8

    SHA1

    aa1f7d406e748457b0d0ff383387eeeb7709dbba

    SHA256

    f8a32f3d67b2d962a15f1df2e4553ae1a57edae0ae9c626beed6b127b497834a

    SHA512

    c62740744e38ab25674d3d832e9e7bcb9c2c4e3e8c848df8549bf717aa661b216824a654a5bea91dba42353ba109ee3a59115fc502aa7ada802ce066f0273085

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\EP7BG61.exe

    Filesize

    492KB

    MD5

    51a06520d3d4b04e7e0339c88780f502

    SHA1

    2c06643b4af99b109c2ef1c27033a8c2e749e4ee

    SHA256

    0e755659628cf59713982d70026d09b730777c3de22d0c17cb2a6599324400de

    SHA512

    06849b668e64c356a8e1f1ef178db6dfd400f004a018c243f2d925b8b1ce0b22dd721b5be3d0a80d6f036521067d48cb78711d04ba44d170e04ce5a34b9daab2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\EP7BG61.exe

    Filesize

    492KB

    MD5

    51a06520d3d4b04e7e0339c88780f502

    SHA1

    2c06643b4af99b109c2ef1c27033a8c2e749e4ee

    SHA256

    0e755659628cf59713982d70026d09b730777c3de22d0c17cb2a6599324400de

    SHA512

    06849b668e64c356a8e1f1ef178db6dfd400f004a018c243f2d925b8b1ce0b22dd721b5be3d0a80d6f036521067d48cb78711d04ba44d170e04ce5a34b9daab2

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1RE40cp9.exe

    Filesize

    194KB

    MD5

    6241b03d68a610324ecda52f0f84e287

    SHA1

    da80280b6e3925e455925efd6c6e59a6118269c4

    SHA256

    ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

    SHA512

    a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1RE40cp9.exe

    Filesize

    194KB

    MD5

    6241b03d68a610324ecda52f0f84e287

    SHA1

    da80280b6e3925e455925efd6c6e59a6118269c4

    SHA256

    ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

    SHA512

    a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2gS8319.exe

    Filesize

    446KB

    MD5

    d4deda2731d5874e222a6d3a6aeb0b7f

    SHA1

    437b5aaa25608bd89a2aac85174718e8448873b4

    SHA256

    93003b640af4060989df99edbd3b39a10bd44230157270bad40bd170f0a7eb45

    SHA512

    4009b34a8f9a5a59fa907b05752ba93c8f6ddc0995b3abab188524dff6e6f92a71e127fd24323aaca58f1ee996e2243913f14a6c6f9db3e936d40d5ae64cacf1

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2gS8319.exe

    Filesize

    446KB

    MD5

    d4deda2731d5874e222a6d3a6aeb0b7f

    SHA1

    437b5aaa25608bd89a2aac85174718e8448873b4

    SHA256

    93003b640af4060989df99edbd3b39a10bd44230157270bad40bd170f0a7eb45

    SHA512

    4009b34a8f9a5a59fa907b05752ba93c8f6ddc0995b3abab188524dff6e6f92a71e127fd24323aaca58f1ee996e2243913f14a6c6f9db3e936d40d5ae64cacf1

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\za6up07.exe

    Filesize

    1.0MB

    MD5

    5f6f2e90497891c3e2a4a5659fc6ec10

    SHA1

    e9d66d8765a11ac1aa96c6272bbb165978359b8b

    SHA256

    e2188146b25739570613fb57161003ab8ce3dfd4111d119e723ab27615dec20f

    SHA512

    6837d97a550d2d867f90f39b5ee8e3b6e4b367f8661cd0f48d4c7f39b8bc540e2ac407296066577e950ddb90ee8a391785c8f3f2dac62b8a689c1408136da861

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\za6up07.exe

    Filesize

    1.0MB

    MD5

    5f6f2e90497891c3e2a4a5659fc6ec10

    SHA1

    e9d66d8765a11ac1aa96c6272bbb165978359b8b

    SHA256

    e2188146b25739570613fb57161003ab8ce3dfd4111d119e723ab27615dec20f

    SHA512

    6837d97a550d2d867f90f39b5ee8e3b6e4b367f8661cd0f48d4c7f39b8bc540e2ac407296066577e950ddb90ee8a391785c8f3f2dac62b8a689c1408136da861

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\wj7cP36.exe

    Filesize

    744KB

    MD5

    0f45f794a6725a0f950c0ed7e15d0fd8

    SHA1

    aa1f7d406e748457b0d0ff383387eeeb7709dbba

    SHA256

    f8a32f3d67b2d962a15f1df2e4553ae1a57edae0ae9c626beed6b127b497834a

    SHA512

    c62740744e38ab25674d3d832e9e7bcb9c2c4e3e8c848df8549bf717aa661b216824a654a5bea91dba42353ba109ee3a59115fc502aa7ada802ce066f0273085

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\wj7cP36.exe

    Filesize

    744KB

    MD5

    0f45f794a6725a0f950c0ed7e15d0fd8

    SHA1

    aa1f7d406e748457b0d0ff383387eeeb7709dbba

    SHA256

    f8a32f3d67b2d962a15f1df2e4553ae1a57edae0ae9c626beed6b127b497834a

    SHA512

    c62740744e38ab25674d3d832e9e7bcb9c2c4e3e8c848df8549bf717aa661b216824a654a5bea91dba42353ba109ee3a59115fc502aa7ada802ce066f0273085

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\EP7BG61.exe

    Filesize

    492KB

    MD5

    51a06520d3d4b04e7e0339c88780f502

    SHA1

    2c06643b4af99b109c2ef1c27033a8c2e749e4ee

    SHA256

    0e755659628cf59713982d70026d09b730777c3de22d0c17cb2a6599324400de

    SHA512

    06849b668e64c356a8e1f1ef178db6dfd400f004a018c243f2d925b8b1ce0b22dd721b5be3d0a80d6f036521067d48cb78711d04ba44d170e04ce5a34b9daab2

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\EP7BG61.exe

    Filesize

    492KB

    MD5

    51a06520d3d4b04e7e0339c88780f502

    SHA1

    2c06643b4af99b109c2ef1c27033a8c2e749e4ee

    SHA256

    0e755659628cf59713982d70026d09b730777c3de22d0c17cb2a6599324400de

    SHA512

    06849b668e64c356a8e1f1ef178db6dfd400f004a018c243f2d925b8b1ce0b22dd721b5be3d0a80d6f036521067d48cb78711d04ba44d170e04ce5a34b9daab2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1RE40cp9.exe

    Filesize

    194KB

    MD5

    6241b03d68a610324ecda52f0f84e287

    SHA1

    da80280b6e3925e455925efd6c6e59a6118269c4

    SHA256

    ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

    SHA512

    a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1RE40cp9.exe

    Filesize

    194KB

    MD5

    6241b03d68a610324ecda52f0f84e287

    SHA1

    da80280b6e3925e455925efd6c6e59a6118269c4

    SHA256

    ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

    SHA512

    a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2gS8319.exe

    Filesize

    446KB

    MD5

    d4deda2731d5874e222a6d3a6aeb0b7f

    SHA1

    437b5aaa25608bd89a2aac85174718e8448873b4

    SHA256

    93003b640af4060989df99edbd3b39a10bd44230157270bad40bd170f0a7eb45

    SHA512

    4009b34a8f9a5a59fa907b05752ba93c8f6ddc0995b3abab188524dff6e6f92a71e127fd24323aaca58f1ee996e2243913f14a6c6f9db3e936d40d5ae64cacf1

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2gS8319.exe

    Filesize

    446KB

    MD5

    d4deda2731d5874e222a6d3a6aeb0b7f

    SHA1

    437b5aaa25608bd89a2aac85174718e8448873b4

    SHA256

    93003b640af4060989df99edbd3b39a10bd44230157270bad40bd170f0a7eb45

    SHA512

    4009b34a8f9a5a59fa907b05752ba93c8f6ddc0995b3abab188524dff6e6f92a71e127fd24323aaca58f1ee996e2243913f14a6c6f9db3e936d40d5ae64cacf1

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2gS8319.exe

    Filesize

    446KB

    MD5

    d4deda2731d5874e222a6d3a6aeb0b7f

    SHA1

    437b5aaa25608bd89a2aac85174718e8448873b4

    SHA256

    93003b640af4060989df99edbd3b39a10bd44230157270bad40bd170f0a7eb45

    SHA512

    4009b34a8f9a5a59fa907b05752ba93c8f6ddc0995b3abab188524dff6e6f92a71e127fd24323aaca58f1ee996e2243913f14a6c6f9db3e936d40d5ae64cacf1

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2gS8319.exe

    Filesize

    446KB

    MD5

    d4deda2731d5874e222a6d3a6aeb0b7f

    SHA1

    437b5aaa25608bd89a2aac85174718e8448873b4

    SHA256

    93003b640af4060989df99edbd3b39a10bd44230157270bad40bd170f0a7eb45

    SHA512

    4009b34a8f9a5a59fa907b05752ba93c8f6ddc0995b3abab188524dff6e6f92a71e127fd24323aaca58f1ee996e2243913f14a6c6f9db3e936d40d5ae64cacf1

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2gS8319.exe

    Filesize

    446KB

    MD5

    d4deda2731d5874e222a6d3a6aeb0b7f

    SHA1

    437b5aaa25608bd89a2aac85174718e8448873b4

    SHA256

    93003b640af4060989df99edbd3b39a10bd44230157270bad40bd170f0a7eb45

    SHA512

    4009b34a8f9a5a59fa907b05752ba93c8f6ddc0995b3abab188524dff6e6f92a71e127fd24323aaca58f1ee996e2243913f14a6c6f9db3e936d40d5ae64cacf1

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2gS8319.exe

    Filesize

    446KB

    MD5

    d4deda2731d5874e222a6d3a6aeb0b7f

    SHA1

    437b5aaa25608bd89a2aac85174718e8448873b4

    SHA256

    93003b640af4060989df99edbd3b39a10bd44230157270bad40bd170f0a7eb45

    SHA512

    4009b34a8f9a5a59fa907b05752ba93c8f6ddc0995b3abab188524dff6e6f92a71e127fd24323aaca58f1ee996e2243913f14a6c6f9db3e936d40d5ae64cacf1

  • memory/1404-85-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1404-87-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1404-76-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1404-77-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1404-78-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1404-80-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1404-81-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1404-83-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1404-82-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/1404-79-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1720-59-0x0000000000A80000-0x0000000000A96000-memory.dmp

    Filesize

    88KB

  • memory/1720-61-0x0000000000A80000-0x0000000000A96000-memory.dmp

    Filesize

    88KB

  • memory/1720-40-0x00000000004E0000-0x00000000004FE000-memory.dmp

    Filesize

    120KB

  • memory/1720-42-0x0000000000A80000-0x0000000000A96000-memory.dmp

    Filesize

    88KB

  • memory/1720-43-0x0000000000A80000-0x0000000000A96000-memory.dmp

    Filesize

    88KB

  • memory/1720-69-0x0000000000A80000-0x0000000000A96000-memory.dmp

    Filesize

    88KB

  • memory/1720-67-0x0000000000A80000-0x0000000000A96000-memory.dmp

    Filesize

    88KB

  • memory/1720-65-0x0000000000A80000-0x0000000000A96000-memory.dmp

    Filesize

    88KB

  • memory/1720-63-0x0000000000A80000-0x0000000000A96000-memory.dmp

    Filesize

    88KB

  • memory/1720-41-0x0000000000A80000-0x0000000000A9C000-memory.dmp

    Filesize

    112KB

  • memory/1720-45-0x0000000000A80000-0x0000000000A96000-memory.dmp

    Filesize

    88KB

  • memory/1720-57-0x0000000000A80000-0x0000000000A96000-memory.dmp

    Filesize

    88KB

  • memory/1720-55-0x0000000000A80000-0x0000000000A96000-memory.dmp

    Filesize

    88KB

  • memory/1720-53-0x0000000000A80000-0x0000000000A96000-memory.dmp

    Filesize

    88KB

  • memory/1720-51-0x0000000000A80000-0x0000000000A96000-memory.dmp

    Filesize

    88KB

  • memory/1720-49-0x0000000000A80000-0x0000000000A96000-memory.dmp

    Filesize

    88KB

  • memory/1720-47-0x0000000000A80000-0x0000000000A96000-memory.dmp

    Filesize

    88KB