Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 06:37

General

  • Target

    file.exe

  • Size

    1.0MB

  • MD5

    1fc4d3ec7d08ed938a35f2c8d12b636b

  • SHA1

    d4615dbe44fe85deeaf5fe4e8786c999f215c415

  • SHA256

    0a5e2b14dcf776e9677e1f6fc5848658bf480a60e7dbb5e3050b2ac6b71f0456

  • SHA512

    cf2e9361df4afc3e2bede2603c108939198bad913fe9e545411751dc654a0ad4b223b427c0ce5afab797fc54947e3e92be7b92bf97626c082630db9e06d65f0c

  • SSDEEP

    12288:aMrxy90k9TgZgCkRxBFiaP/gt2y02cgosE7NqiRuxReG35C1v/UmGoFMAioisWJ8:zypKFYc028rzu3Rkv/Uf1oi+

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\To5mI99.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\To5mI99.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\UF3Qe28.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\UF3Qe28.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2704
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\GU6Bt51.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\GU6Bt51.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2672
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1GB51vx2.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1GB51vx2.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2692
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1940
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 268
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\To5mI99.exe

    Filesize

    904KB

    MD5

    c403a7511befbc3766783cda396b4bdc

    SHA1

    a7c669c907d6a216a0c4f406bb4040edfde030d5

    SHA256

    41531a11b79438b80e2f0c44f1f05bd0055cb3fa5b78edc346f861ac5875ce77

    SHA512

    9a0a4a6e27b06100ee88104381ce20aac7d8228ed63fe8f4d660f04683a8a497af1481be25111d5b1753ac37ee66dc66186e64503521d2ab49b1d0a0289ea741

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\To5mI99.exe

    Filesize

    904KB

    MD5

    c403a7511befbc3766783cda396b4bdc

    SHA1

    a7c669c907d6a216a0c4f406bb4040edfde030d5

    SHA256

    41531a11b79438b80e2f0c44f1f05bd0055cb3fa5b78edc346f861ac5875ce77

    SHA512

    9a0a4a6e27b06100ee88104381ce20aac7d8228ed63fe8f4d660f04683a8a497af1481be25111d5b1753ac37ee66dc66186e64503521d2ab49b1d0a0289ea741

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\UF3Qe28.exe

    Filesize

    615KB

    MD5

    64d6447cc1450c49c457d43cb3c32dad

    SHA1

    5cf5015ee3597f7ca6da54b8faad7bd72dd622fe

    SHA256

    b9874ef4af3b186a86a9982363cf7721c3c36db9b68c3bf27d4e6a3538a2fa60

    SHA512

    9e74329cc0672d70e6608adb3919f5fab77f61da94b620776d06adcd8354c6687b7764789ffea42e58ce6eb4d8007dedb319154a6d545466b695af7521a72aa5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\UF3Qe28.exe

    Filesize

    615KB

    MD5

    64d6447cc1450c49c457d43cb3c32dad

    SHA1

    5cf5015ee3597f7ca6da54b8faad7bd72dd622fe

    SHA256

    b9874ef4af3b186a86a9982363cf7721c3c36db9b68c3bf27d4e6a3538a2fa60

    SHA512

    9e74329cc0672d70e6608adb3919f5fab77f61da94b620776d06adcd8354c6687b7764789ffea42e58ce6eb4d8007dedb319154a6d545466b695af7521a72aa5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\GU6Bt51.exe

    Filesize

    378KB

    MD5

    f112d6f0b3a328a830e79cb95acf88f7

    SHA1

    4820bcb5c7d28eea144ea0ae9618535d1f711d29

    SHA256

    c160023188fb505993c0b4098db4ebcb95d15b6abfbbe72a6e653589463d9f71

    SHA512

    20fdf108519b391add9f5b45967f57aacaeb054d06bfcb8ff2b66dd1bbec00a5da3519a0e51fe94d6bda51843a276d5e821af1e7f007392de5b140cb331524f2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\GU6Bt51.exe

    Filesize

    378KB

    MD5

    f112d6f0b3a328a830e79cb95acf88f7

    SHA1

    4820bcb5c7d28eea144ea0ae9618535d1f711d29

    SHA256

    c160023188fb505993c0b4098db4ebcb95d15b6abfbbe72a6e653589463d9f71

    SHA512

    20fdf108519b391add9f5b45967f57aacaeb054d06bfcb8ff2b66dd1bbec00a5da3519a0e51fe94d6bda51843a276d5e821af1e7f007392de5b140cb331524f2

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1GB51vx2.exe

    Filesize

    237KB

    MD5

    5d5d9835f188fcb59555158860b424ad

    SHA1

    a73397c1d2605e706c7421a0e806f2441ec07fa6

    SHA256

    a99f8d86bf19f472de61efc0bb4922a18a1131eef35e4c6a0d922d82b182d4f8

    SHA512

    aa308fd36fadf3f42b142589718693a2a3dcc0c329f382764137de1448ecf62bd296682b997517fe4e36960ae00873097c1a3e0bdcf41a30fff24bf57763504f

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1GB51vx2.exe

    Filesize

    237KB

    MD5

    5d5d9835f188fcb59555158860b424ad

    SHA1

    a73397c1d2605e706c7421a0e806f2441ec07fa6

    SHA256

    a99f8d86bf19f472de61efc0bb4922a18a1131eef35e4c6a0d922d82b182d4f8

    SHA512

    aa308fd36fadf3f42b142589718693a2a3dcc0c329f382764137de1448ecf62bd296682b997517fe4e36960ae00873097c1a3e0bdcf41a30fff24bf57763504f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\To5mI99.exe

    Filesize

    904KB

    MD5

    c403a7511befbc3766783cda396b4bdc

    SHA1

    a7c669c907d6a216a0c4f406bb4040edfde030d5

    SHA256

    41531a11b79438b80e2f0c44f1f05bd0055cb3fa5b78edc346f861ac5875ce77

    SHA512

    9a0a4a6e27b06100ee88104381ce20aac7d8228ed63fe8f4d660f04683a8a497af1481be25111d5b1753ac37ee66dc66186e64503521d2ab49b1d0a0289ea741

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\To5mI99.exe

    Filesize

    904KB

    MD5

    c403a7511befbc3766783cda396b4bdc

    SHA1

    a7c669c907d6a216a0c4f406bb4040edfde030d5

    SHA256

    41531a11b79438b80e2f0c44f1f05bd0055cb3fa5b78edc346f861ac5875ce77

    SHA512

    9a0a4a6e27b06100ee88104381ce20aac7d8228ed63fe8f4d660f04683a8a497af1481be25111d5b1753ac37ee66dc66186e64503521d2ab49b1d0a0289ea741

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\UF3Qe28.exe

    Filesize

    615KB

    MD5

    64d6447cc1450c49c457d43cb3c32dad

    SHA1

    5cf5015ee3597f7ca6da54b8faad7bd72dd622fe

    SHA256

    b9874ef4af3b186a86a9982363cf7721c3c36db9b68c3bf27d4e6a3538a2fa60

    SHA512

    9e74329cc0672d70e6608adb3919f5fab77f61da94b620776d06adcd8354c6687b7764789ffea42e58ce6eb4d8007dedb319154a6d545466b695af7521a72aa5

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\UF3Qe28.exe

    Filesize

    615KB

    MD5

    64d6447cc1450c49c457d43cb3c32dad

    SHA1

    5cf5015ee3597f7ca6da54b8faad7bd72dd622fe

    SHA256

    b9874ef4af3b186a86a9982363cf7721c3c36db9b68c3bf27d4e6a3538a2fa60

    SHA512

    9e74329cc0672d70e6608adb3919f5fab77f61da94b620776d06adcd8354c6687b7764789ffea42e58ce6eb4d8007dedb319154a6d545466b695af7521a72aa5

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\GU6Bt51.exe

    Filesize

    378KB

    MD5

    f112d6f0b3a328a830e79cb95acf88f7

    SHA1

    4820bcb5c7d28eea144ea0ae9618535d1f711d29

    SHA256

    c160023188fb505993c0b4098db4ebcb95d15b6abfbbe72a6e653589463d9f71

    SHA512

    20fdf108519b391add9f5b45967f57aacaeb054d06bfcb8ff2b66dd1bbec00a5da3519a0e51fe94d6bda51843a276d5e821af1e7f007392de5b140cb331524f2

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\GU6Bt51.exe

    Filesize

    378KB

    MD5

    f112d6f0b3a328a830e79cb95acf88f7

    SHA1

    4820bcb5c7d28eea144ea0ae9618535d1f711d29

    SHA256

    c160023188fb505993c0b4098db4ebcb95d15b6abfbbe72a6e653589463d9f71

    SHA512

    20fdf108519b391add9f5b45967f57aacaeb054d06bfcb8ff2b66dd1bbec00a5da3519a0e51fe94d6bda51843a276d5e821af1e7f007392de5b140cb331524f2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1GB51vx2.exe

    Filesize

    237KB

    MD5

    5d5d9835f188fcb59555158860b424ad

    SHA1

    a73397c1d2605e706c7421a0e806f2441ec07fa6

    SHA256

    a99f8d86bf19f472de61efc0bb4922a18a1131eef35e4c6a0d922d82b182d4f8

    SHA512

    aa308fd36fadf3f42b142589718693a2a3dcc0c329f382764137de1448ecf62bd296682b997517fe4e36960ae00873097c1a3e0bdcf41a30fff24bf57763504f

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1GB51vx2.exe

    Filesize

    237KB

    MD5

    5d5d9835f188fcb59555158860b424ad

    SHA1

    a73397c1d2605e706c7421a0e806f2441ec07fa6

    SHA256

    a99f8d86bf19f472de61efc0bb4922a18a1131eef35e4c6a0d922d82b182d4f8

    SHA512

    aa308fd36fadf3f42b142589718693a2a3dcc0c329f382764137de1448ecf62bd296682b997517fe4e36960ae00873097c1a3e0bdcf41a30fff24bf57763504f

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1GB51vx2.exe

    Filesize

    237KB

    MD5

    5d5d9835f188fcb59555158860b424ad

    SHA1

    a73397c1d2605e706c7421a0e806f2441ec07fa6

    SHA256

    a99f8d86bf19f472de61efc0bb4922a18a1131eef35e4c6a0d922d82b182d4f8

    SHA512

    aa308fd36fadf3f42b142589718693a2a3dcc0c329f382764137de1448ecf62bd296682b997517fe4e36960ae00873097c1a3e0bdcf41a30fff24bf57763504f

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1GB51vx2.exe

    Filesize

    237KB

    MD5

    5d5d9835f188fcb59555158860b424ad

    SHA1

    a73397c1d2605e706c7421a0e806f2441ec07fa6

    SHA256

    a99f8d86bf19f472de61efc0bb4922a18a1131eef35e4c6a0d922d82b182d4f8

    SHA512

    aa308fd36fadf3f42b142589718693a2a3dcc0c329f382764137de1448ecf62bd296682b997517fe4e36960ae00873097c1a3e0bdcf41a30fff24bf57763504f

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1GB51vx2.exe

    Filesize

    237KB

    MD5

    5d5d9835f188fcb59555158860b424ad

    SHA1

    a73397c1d2605e706c7421a0e806f2441ec07fa6

    SHA256

    a99f8d86bf19f472de61efc0bb4922a18a1131eef35e4c6a0d922d82b182d4f8

    SHA512

    aa308fd36fadf3f42b142589718693a2a3dcc0c329f382764137de1448ecf62bd296682b997517fe4e36960ae00873097c1a3e0bdcf41a30fff24bf57763504f

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1GB51vx2.exe

    Filesize

    237KB

    MD5

    5d5d9835f188fcb59555158860b424ad

    SHA1

    a73397c1d2605e706c7421a0e806f2441ec07fa6

    SHA256

    a99f8d86bf19f472de61efc0bb4922a18a1131eef35e4c6a0d922d82b182d4f8

    SHA512

    aa308fd36fadf3f42b142589718693a2a3dcc0c329f382764137de1448ecf62bd296682b997517fe4e36960ae00873097c1a3e0bdcf41a30fff24bf57763504f

  • memory/1940-41-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1940-44-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/1940-47-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1940-49-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1940-45-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1940-40-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1940-43-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1940-42-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB