Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
164s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 16:18
Static task
static1
Behavioral task
behavioral1
Sample
4154ab977f4ffdbc41047e20d3eff94f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4154ab977f4ffdbc41047e20d3eff94f.exe
Resource
win10v2004-20231215-en
General
-
Target
4154ab977f4ffdbc41047e20d3eff94f.exe
-
Size
375KB
-
MD5
4154ab977f4ffdbc41047e20d3eff94f
-
SHA1
81ed0997e7b2d598c4a86b26544d9fe6e3f11678
-
SHA256
f6efa6beb48f15626a65f0c40d8de9500a569d10f6955ed9f15afc9a604a3138
-
SHA512
986c447d30efd64e90b0ff63cec8ef855989410ec6b1c76a56ac1a674c894b1e1f215709587b88a1b754106abe23e11a700909293f1e8e9bc529538237d46680
-
SSDEEP
6144:dVXGYtc7MowT2eFdOywz7HUIAo92MG5uSa9kMFgjKZCyLgNwP91fCkUOxKrNLLAJ:1OAowRFd/wP08AMG5uPzFgjm9LgK9KVG
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 4154ab977f4ffdbc41047e20d3eff94f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 4154ab977f4ffdbc41047e20d3eff94f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 4154ab977f4ffdbc41047e20d3eff94f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6AEB00014973000A814AB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6AEB00014973000A814AB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6AEB00014973000A814AB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6AEB00014973000A814AB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 4154ab977f4ffdbc41047e20d3eff94f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 4154ab977f4ffdbc41047e20d3eff94f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6AEB00014973000A814AB4EB2331.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2644 043A6AEB00014973000A814AB4EB2331.exe -
Executes dropped EXE 1 IoCs
pid Process 2644 043A6AEB00014973000A814AB4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 1744 4154ab977f4ffdbc41047e20d3eff94f.exe 1744 4154ab977f4ffdbc41047e20d3eff94f.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 4154ab977f4ffdbc41047e20d3eff94f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 4154ab977f4ffdbc41047e20d3eff94f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 4154ab977f4ffdbc41047e20d3eff94f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6AEB00014973000A814AB4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 4154ab977f4ffdbc41047e20d3eff94f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6AEB00014973000A814AB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6AEB00014973000A814AB4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 043A6AEB00014973000A814AB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 4154ab977f4ffdbc41047e20d3eff94f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 4154ab977f4ffdbc41047e20d3eff94f.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 4154ab977f4ffdbc41047e20d3eff94f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6AEB00014973000A814AB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6AEB00014973000A814AB4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 043A6AEB00014973000A814AB4EB2331.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\043A6AEB00014973000A814AB4EB2331 = "C:\\ProgramData\\043A6AEB00014973000A814AB4EB2331\\043A6AEB00014973000A814AB4EB2331.exe" 043A6AEB00014973000A814AB4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1744 4154ab977f4ffdbc41047e20d3eff94f.exe 1744 4154ab977f4ffdbc41047e20d3eff94f.exe 1744 4154ab977f4ffdbc41047e20d3eff94f.exe 1744 4154ab977f4ffdbc41047e20d3eff94f.exe 1744 4154ab977f4ffdbc41047e20d3eff94f.exe 1744 4154ab977f4ffdbc41047e20d3eff94f.exe 1744 4154ab977f4ffdbc41047e20d3eff94f.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2644 043A6AEB00014973000A814AB4EB2331.exe 2644 043A6AEB00014973000A814AB4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2644 1744 4154ab977f4ffdbc41047e20d3eff94f.exe 28 PID 1744 wrote to memory of 2644 1744 4154ab977f4ffdbc41047e20d3eff94f.exe 28 PID 1744 wrote to memory of 2644 1744 4154ab977f4ffdbc41047e20d3eff94f.exe 28 PID 1744 wrote to memory of 2644 1744 4154ab977f4ffdbc41047e20d3eff94f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4154ab977f4ffdbc41047e20d3eff94f.exe"C:\Users\Admin\AppData\Local\Temp\4154ab977f4ffdbc41047e20d3eff94f.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\ProgramData\043A6AEB00014973000A814AB4EB2331\043A6AEB00014973000A814AB4EB2331.exe"C:\ProgramData\043A6AEB00014973000A814AB4EB2331\043A6AEB00014973000A814AB4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\4154ab977f4ffdbc41047e20d3eff94f.exe"2⤵
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD58ff397f5b3da491c6db2c50a4a24f8ff
SHA1f7719d19636368f55e72c1105e050c2831818ab3
SHA2562ea1b052b44afb0b12cf596e8826467e91a6c51d2ff88030eeca64583032cdd1
SHA512e661bbe1ee8d71909ea28e389b8d91e7519a55d157a8054e4200d2cf87d1b1433bed966a6ddd01d49260f2affb9b0e8ca8af4e2d09b4b31af11c4132cac5e357
-
Filesize
31KB
MD5212e920b1b34e53dd0ff24dc17df3750
SHA12aa7434ff30edcdec4516468488be721796f08e7
SHA256b257f0d0fef47d6c48e8272e2f2ed85fc007b6755394392ed887df56c4d6ebd5
SHA5124b7c23d05417799e8879c583e9b8554fce606c6cef2e4bd9c90ada65a42a0b18a2850c5b9720fd8b9c7e1d756614f7de79f2e021f88e1cbaec8b0b48d6625cd7
-
Filesize
183KB
MD5adfc3710360e060e3ea7e36f6dd93509
SHA1599d74779b38e18afe2cc54616de0ca0f9a6c93f
SHA2560542eb81d647710733a61f83a4f8b2eebe0ccb323b6f0efa328e20112ce0dfe8
SHA5128354820ce10bf4f5eb74332efe963adaca622eb7b271db6ebf6273d3d11b27e439cc20369088b30ae1e72484bcaa19abe7ce7b7e39907dd76f7861aca0f8114f
-
Filesize
375KB
MD54154ab977f4ffdbc41047e20d3eff94f
SHA181ed0997e7b2d598c4a86b26544d9fe6e3f11678
SHA256f6efa6beb48f15626a65f0c40d8de9500a569d10f6955ed9f15afc9a604a3138
SHA512986c447d30efd64e90b0ff63cec8ef855989410ec6b1c76a56ac1a674c894b1e1f215709587b88a1b754106abe23e11a700909293f1e8e9bc529538237d46680
-
Filesize
67KB
MD56b3bd2d41939dfb5040bca7fdd66b2fb
SHA1a7dfd374cc157bc631cc368af38e18a1ce2b82d8
SHA25681ce850dd4e18efbffa4fe3b9feeae35cc86773945261c525d6fa64c978cabf7
SHA5126dc0fba9b597840e7aaf5c918f7d69aac9e3ad77f4ed0399acab9cffd4a457419aca67ee191d2d411ef3c92293b61c042cd8869124d5ba8e32cb756c0029ae15