Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
8s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 21:50
Static task
static1
Behavioral task
behavioral1
Sample
13d52214a7854b79f127abb331e41441.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
13d52214a7854b79f127abb331e41441.exe
Resource
win10v2004-20231222-en
General
-
Target
13d52214a7854b79f127abb331e41441.exe
-
Size
384KB
-
MD5
13d52214a7854b79f127abb331e41441
-
SHA1
f6ce7c1ce860087a737bef3c37e65e098e69d159
-
SHA256
9a0e928bc097345f21409fcaa0df7dd7fc6423162c50adbc52143d782bad3bae
-
SHA512
22acdb39d0b63997671e1a0a87d1c5fca2cb930a7a3195bf3fe4fff3287baa4073bd0087640c7a3963b84ae128f4db93dd39d5c07dec3206bdb2dd2a8d5d1c30
-
SSDEEP
6144:GBwtaRv55G5ke9MRs0On1SIFs7Bqwtj9kJ8c0IITjZ0N7/cYL9duz4hwOUu808O3:4R5GdCs0O1BkBqwtjFc0fTjZOT59ozIp
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 13d52214a7854b79f127abb331e41441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 13d52214a7854b79f127abb331e41441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000BB725B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000BB725B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 13d52214a7854b79f127abb331e41441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 13d52214a7854b79f127abb331e41441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 13d52214a7854b79f127abb331e41441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000BB725B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000BB725B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000BB725B4EB2331.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2308 043A6A5B00014973000BB725B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 2808 13d52214a7854b79f127abb331e41441.exe 2808 13d52214a7854b79f127abb331e41441.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 13d52214a7854b79f127abb331e41441.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 13d52214a7854b79f127abb331e41441.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000BB725B4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000BB725B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 13d52214a7854b79f127abb331e41441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000BB725B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000BB725B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 13d52214a7854b79f127abb331e41441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 13d52214a7854b79f127abb331e41441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 13d52214a7854b79f127abb331e41441.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 13d52214a7854b79f127abb331e41441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000BB725B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000BB725B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000BB725B4EB2331.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\043A6A5B00014973000BB725B4EB2331 = "C:\\ProgramData\\043A6A5B00014973000BB725B4EB2331\\043A6A5B00014973000BB725B4EB2331.exe" 043A6A5B00014973000BB725B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2808 13d52214a7854b79f127abb331e41441.exe 2808 13d52214a7854b79f127abb331e41441.exe 2808 13d52214a7854b79f127abb331e41441.exe 2808 13d52214a7854b79f127abb331e41441.exe 2808 13d52214a7854b79f127abb331e41441.exe 2808 13d52214a7854b79f127abb331e41441.exe 2808 13d52214a7854b79f127abb331e41441.exe 2308 043A6A5B00014973000BB725B4EB2331.exe 2308 043A6A5B00014973000BB725B4EB2331.exe 2308 043A6A5B00014973000BB725B4EB2331.exe 2308 043A6A5B00014973000BB725B4EB2331.exe 2308 043A6A5B00014973000BB725B4EB2331.exe 2308 043A6A5B00014973000BB725B4EB2331.exe 2308 043A6A5B00014973000BB725B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2308 2808 13d52214a7854b79f127abb331e41441.exe 16 PID 2808 wrote to memory of 2308 2808 13d52214a7854b79f127abb331e41441.exe 16 PID 2808 wrote to memory of 2308 2808 13d52214a7854b79f127abb331e41441.exe 16 PID 2808 wrote to memory of 2308 2808 13d52214a7854b79f127abb331e41441.exe 16
Processes
-
C:\ProgramData\043A6A5B00014973000BB725B4EB2331\043A6A5B00014973000BB725B4EB2331.exe"C:\ProgramData\043A6A5B00014973000BB725B4EB2331\043A6A5B00014973000BB725B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\13d52214a7854b79f127abb331e41441.exe"1⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2308
-
C:\Users\Admin\AppData\Local\Temp\13d52214a7854b79f127abb331e41441.exe"C:\Users\Admin\AppData\Local\Temp\13d52214a7854b79f127abb331e41441.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD50907f19d5b445f9ca30161257967402c
SHA158d3bebe0c4a41ddad1a90c9909ac40b86f8dbb6
SHA2568a2fa06d0dc63f500f22db2fbaf408f5381d2bea082f87d272cc8b75b2a679b7
SHA512cf570921b9ec32886533b51451131cf68c0f0ef63b1206889aa4130d838b1006323cbb3fd3c0d1774afa94a65473a9ce2fbc447f1b3f5690173437f66f2f2260