Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
454499b625f272d351c7981f7dd5006e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
454499b625f272d351c7981f7dd5006e.exe
Resource
win10v2004-20231215-en
General
-
Target
454499b625f272d351c7981f7dd5006e.exe
-
Size
365KB
-
MD5
454499b625f272d351c7981f7dd5006e
-
SHA1
26d0318265fbec929494abe069649b9c770a4738
-
SHA256
7d4625fb4967ad1cee8e77f6399e8d7e5d6aa59ab53eb4962e5d1c5e2146536c
-
SHA512
e9f766a537d8664acc6e4baed7efdeb05aca0d44ab260b2577085d2d4a408cba7cfae2744276a07d3c5186fb8d4b04cab127a04e74e69bf7b58de59b1580a495
-
SSDEEP
6144:Gnq+bIZrZL+TnqRTMdDVJJ8pnXunpWH3rF2dWVOfis9yMdnWFJ0htBuNhRI:x+IZQrqRAdD+pXunQ7F2djdIJ0ht6k
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 454499b625f272d351c7981f7dd5006e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 454499b625f272d351c7981f7dd5006e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 454499b625f272d351c7981f7dd5006e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 454499b625f272d351c7981f7dd5006e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 454499b625f272d351c7981f7dd5006e.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2312 043A6AEB00014973000C4779B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 2644 454499b625f272d351c7981f7dd5006e.exe 2644 454499b625f272d351c7981f7dd5006e.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 454499b625f272d351c7981f7dd5006e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 454499b625f272d351c7981f7dd5006e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 454499b625f272d351c7981f7dd5006e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 454499b625f272d351c7981f7dd5006e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 454499b625f272d351c7981f7dd5006e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 454499b625f272d351c7981f7dd5006e.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 454499b625f272d351c7981f7dd5006e.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2644 454499b625f272d351c7981f7dd5006e.exe 2644 454499b625f272d351c7981f7dd5006e.exe 2644 454499b625f272d351c7981f7dd5006e.exe 2644 454499b625f272d351c7981f7dd5006e.exe 2644 454499b625f272d351c7981f7dd5006e.exe 2644 454499b625f272d351c7981f7dd5006e.exe 2644 454499b625f272d351c7981f7dd5006e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2312 2644 454499b625f272d351c7981f7dd5006e.exe 28 PID 2644 wrote to memory of 2312 2644 454499b625f272d351c7981f7dd5006e.exe 28 PID 2644 wrote to memory of 2312 2644 454499b625f272d351c7981f7dd5006e.exe 28 PID 2644 wrote to memory of 2312 2644 454499b625f272d351c7981f7dd5006e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\454499b625f272d351c7981f7dd5006e.exe"C:\Users\Admin\AppData\Local\Temp\454499b625f272d351c7981f7dd5006e.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\ProgramData\043A6AEB00014973000C4779B4EB2331\043A6AEB00014973000C4779B4EB2331.exe"C:\ProgramData\043A6AEB00014973000C4779B4EB2331\043A6AEB00014973000C4779B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\454499b625f272d351c7981f7dd5006e.exe"2⤵
- Executes dropped EXE
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
365KB
MD5454499b625f272d351c7981f7dd5006e
SHA126d0318265fbec929494abe069649b9c770a4738
SHA2567d4625fb4967ad1cee8e77f6399e8d7e5d6aa59ab53eb4962e5d1c5e2146536c
SHA512e9f766a537d8664acc6e4baed7efdeb05aca0d44ab260b2577085d2d4a408cba7cfae2744276a07d3c5186fb8d4b04cab127a04e74e69bf7b58de59b1580a495