Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 19:13
Static task
static1
Behavioral task
behavioral1
Sample
ab3233851d7f29ea66074a9a50a59540N.exe
Resource
win7-20240903-en
General
-
Target
ab3233851d7f29ea66074a9a50a59540N.exe
-
Size
330KB
-
MD5
ab3233851d7f29ea66074a9a50a59540
-
SHA1
7d5b8e5c84e0908261afa1f9f47264d2d1820724
-
SHA256
f18dbf85ce6e20ff9639b55c4f595e76ed93888cf6a87afdad0abd5689f531cb
-
SHA512
e27242405648634f9c572d8b67e0e62c536cf95b355a2eeecd676abcc0a993fb170d7515c298b9a0dbeed6c16b36ce502bb0d6ca2957c838624ca0385e930006
-
SSDEEP
6144:YeC4EwZFoobUk8qp0qpgogZfpjkNaXihVP:8fhuLwflkLVP
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" yi0atn23.bat Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" yi0atn23.bat Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" yi0atn23.bat Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection ab3233851d7f29ea66074a9a50a59540N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ab3233851d7f29ea66074a9a50a59540N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ab3233851d7f29ea66074a9a50a59540N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ab3233851d7f29ea66074a9a50a59540N.exe -
Deletes itself 1 IoCs
pid Process 2932 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 632 yi0atn23.bat -
Loads dropped DLL 1 IoCs
pid Process 2032 ab3233851d7f29ea66074a9a50a59540N.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features ab3233851d7f29ea66074a9a50a59540N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features yi0atn23.bat -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 api.ipify.org 9 api.ipify.org -
Launches sc.exe 22 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3064 sc.exe 1612 sc.exe 3024 sc.exe 1728 sc.exe 1156 sc.exe 1204 sc.exe 1960 sc.exe 3004 sc.exe 2400 sc.exe 2740 sc.exe 2856 sc.exe 2588 sc.exe 2592 sc.exe 2920 sc.exe 2844 sc.exe 2892 sc.exe 2876 sc.exe 2608 sc.exe 2020 sc.exe 264 sc.exe 3000 sc.exe 2416 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 1664 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2032 ab3233851d7f29ea66074a9a50a59540N.exe 2032 ab3233851d7f29ea66074a9a50a59540N.exe 2032 ab3233851d7f29ea66074a9a50a59540N.exe 2032 ab3233851d7f29ea66074a9a50a59540N.exe 2032 ab3233851d7f29ea66074a9a50a59540N.exe 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 564 powershell.exe 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 1268 powershell.exe 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat 632 yi0atn23.bat -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2032 ab3233851d7f29ea66074a9a50a59540N.exe Token: SeDebugPrivilege 632 yi0atn23.bat Token: SeSecurityPrivilege 1812 wevtutil.exe Token: SeBackupPrivilege 1812 wevtutil.exe Token: SeDebugPrivilege 564 powershell.exe Token: SeDebugPrivilege 1268 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1728 2032 ab3233851d7f29ea66074a9a50a59540N.exe 30 PID 2032 wrote to memory of 1728 2032 ab3233851d7f29ea66074a9a50a59540N.exe 30 PID 2032 wrote to memory of 1728 2032 ab3233851d7f29ea66074a9a50a59540N.exe 30 PID 2032 wrote to memory of 2400 2032 ab3233851d7f29ea66074a9a50a59540N.exe 31 PID 2032 wrote to memory of 2400 2032 ab3233851d7f29ea66074a9a50a59540N.exe 31 PID 2032 wrote to memory of 2400 2032 ab3233851d7f29ea66074a9a50a59540N.exe 31 PID 2032 wrote to memory of 1828 2032 ab3233851d7f29ea66074a9a50a59540N.exe 34 PID 2032 wrote to memory of 1828 2032 ab3233851d7f29ea66074a9a50a59540N.exe 34 PID 2032 wrote to memory of 1828 2032 ab3233851d7f29ea66074a9a50a59540N.exe 34 PID 2032 wrote to memory of 2740 2032 ab3233851d7f29ea66074a9a50a59540N.exe 36 PID 2032 wrote to memory of 2740 2032 ab3233851d7f29ea66074a9a50a59540N.exe 36 PID 2032 wrote to memory of 2740 2032 ab3233851d7f29ea66074a9a50a59540N.exe 36 PID 1828 wrote to memory of 2856 1828 cmd.exe 38 PID 1828 wrote to memory of 2856 1828 cmd.exe 38 PID 1828 wrote to memory of 2856 1828 cmd.exe 38 PID 2032 wrote to memory of 2724 2032 ab3233851d7f29ea66074a9a50a59540N.exe 39 PID 2032 wrote to memory of 2724 2032 ab3233851d7f29ea66074a9a50a59540N.exe 39 PID 2032 wrote to memory of 2724 2032 ab3233851d7f29ea66074a9a50a59540N.exe 39 PID 2032 wrote to memory of 2892 2032 ab3233851d7f29ea66074a9a50a59540N.exe 41 PID 2032 wrote to memory of 2892 2032 ab3233851d7f29ea66074a9a50a59540N.exe 41 PID 2032 wrote to memory of 2892 2032 ab3233851d7f29ea66074a9a50a59540N.exe 41 PID 2724 wrote to memory of 2876 2724 cmd.exe 43 PID 2724 wrote to memory of 2876 2724 cmd.exe 43 PID 2724 wrote to memory of 2876 2724 cmd.exe 43 PID 2032 wrote to memory of 2300 2032 ab3233851d7f29ea66074a9a50a59540N.exe 44 PID 2032 wrote to memory of 2300 2032 ab3233851d7f29ea66074a9a50a59540N.exe 44 PID 2032 wrote to memory of 2300 2032 ab3233851d7f29ea66074a9a50a59540N.exe 44 PID 2032 wrote to memory of 2800 2032 ab3233851d7f29ea66074a9a50a59540N.exe 45 PID 2032 wrote to memory of 2800 2032 ab3233851d7f29ea66074a9a50a59540N.exe 45 PID 2032 wrote to memory of 2800 2032 ab3233851d7f29ea66074a9a50a59540N.exe 45 PID 2300 wrote to memory of 2592 2300 cmd.exe 48 PID 2300 wrote to memory of 2592 2300 cmd.exe 48 PID 2300 wrote to memory of 2592 2300 cmd.exe 48 PID 2032 wrote to memory of 2588 2032 ab3233851d7f29ea66074a9a50a59540N.exe 49 PID 2032 wrote to memory of 2588 2032 ab3233851d7f29ea66074a9a50a59540N.exe 49 PID 2032 wrote to memory of 2588 2032 ab3233851d7f29ea66074a9a50a59540N.exe 49 PID 2800 wrote to memory of 2608 2800 cmd.exe 50 PID 2800 wrote to memory of 2608 2800 cmd.exe 50 PID 2800 wrote to memory of 2608 2800 cmd.exe 50 PID 2032 wrote to memory of 1044 2032 ab3233851d7f29ea66074a9a50a59540N.exe 52 PID 2032 wrote to memory of 1044 2032 ab3233851d7f29ea66074a9a50a59540N.exe 52 PID 2032 wrote to memory of 1044 2032 ab3233851d7f29ea66074a9a50a59540N.exe 52 PID 1044 wrote to memory of 3064 1044 cmd.exe 54 PID 1044 wrote to memory of 3064 1044 cmd.exe 54 PID 1044 wrote to memory of 3064 1044 cmd.exe 54 PID 2032 wrote to memory of 632 2032 ab3233851d7f29ea66074a9a50a59540N.exe 55 PID 2032 wrote to memory of 632 2032 ab3233851d7f29ea66074a9a50a59540N.exe 55 PID 2032 wrote to memory of 632 2032 ab3233851d7f29ea66074a9a50a59540N.exe 55 PID 2032 wrote to memory of 2932 2032 ab3233851d7f29ea66074a9a50a59540N.exe 56 PID 2032 wrote to memory of 2932 2032 ab3233851d7f29ea66074a9a50a59540N.exe 56 PID 2032 wrote to memory of 2932 2032 ab3233851d7f29ea66074a9a50a59540N.exe 56 PID 632 wrote to memory of 2920 632 yi0atn23.bat 59 PID 632 wrote to memory of 2920 632 yi0atn23.bat 59 PID 632 wrote to memory of 2920 632 yi0atn23.bat 59 PID 632 wrote to memory of 2844 632 yi0atn23.bat 58 PID 632 wrote to memory of 2844 632 yi0atn23.bat 58 PID 632 wrote to memory of 2844 632 yi0atn23.bat 58 PID 2932 wrote to memory of 2840 2932 cmd.exe 62 PID 2932 wrote to memory of 2840 2932 cmd.exe 62 PID 2932 wrote to memory of 2840 2932 cmd.exe 62 PID 2932 wrote to memory of 1072 2932 cmd.exe 63 PID 2932 wrote to memory of 1072 2932 cmd.exe 63 PID 2932 wrote to memory of 1072 2932 cmd.exe 63 PID 2932 wrote to memory of 1664 2932 cmd.exe 64 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 2840 attrib.exe 984 attrib.exe 2024 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab3233851d7f29ea66074a9a50a59540N.exe"C:\Users\Admin\AppData\Local\Temp\ab3233851d7f29ea66074a9a50a59540N.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config wdfilter start=disabled2⤵
- Launches sc.exe
PID:1728
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config WerSvc start=disabled2⤵
- Launches sc.exe
PID:2400
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop wdfilter2⤵
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\system32\sc.exesc stop wdfilter3⤵
- Launches sc.exe
PID:2856
-
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config WinDefend start=disabled2⤵
- Launches sc.exe
PID:2740
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop WerSvc2⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\system32\sc.exesc stop WerSvc3⤵
- Launches sc.exe
PID:2876
-
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config WdNisSvc start=disabled2⤵
- Launches sc.exe
PID:2892
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop WinDefend2⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\system32\sc.exesc stop WinDefend3⤵
- Launches sc.exe
PID:2592
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop WdNisSvc2⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\system32\sc.exesc stop WdNisSvc3⤵
- Launches sc.exe
PID:2608
-
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config XblGameSave start=disabled2⤵
- Launches sc.exe
PID:2588
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop XblGameSave2⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\system32\sc.exesc stop XblGameSave3⤵
- Launches sc.exe
PID:3064
-
-
-
C:\Users\Admin\AppData\Local\Temp\yi0atn23.bat"C:\Users\Admin\AppData\Local\Temp\yi0atn23.bat" ok2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config wdfilter start=disabled3⤵
- Launches sc.exe
PID:2844
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config WerSvc start=disabled3⤵
- Launches sc.exe
PID:2920
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop wdfilter3⤵PID:1364
-
C:\Windows\system32\sc.exesc stop wdfilter4⤵
- Launches sc.exe
PID:1204
-
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config WinDefend start=disabled3⤵
- Launches sc.exe
PID:1156
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop WerSvc3⤵PID:2112
-
C:\Windows\system32\sc.exesc stop WerSvc4⤵
- Launches sc.exe
PID:264
-
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config WdNisSvc start=disabled3⤵
- Launches sc.exe
PID:2020
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop WinDefend3⤵PID:1488
-
C:\Windows\system32\sc.exesc stop WinDefend4⤵
- Launches sc.exe
PID:3004
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop WdNisSvc3⤵PID:392
-
C:\Windows\system32\sc.exesc stop WdNisSvc4⤵
- Launches sc.exe
PID:1960
-
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config XblGameSave start=disabled3⤵
- Launches sc.exe
PID:3000
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop XblGameSave3⤵PID:1704
-
C:\Windows\system32\sc.exesc stop XblGameSave4⤵
- Launches sc.exe
PID:1612
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" New-NetQosPolicy -Name "XXXXX" -AppPathNameMatchCondition "C:\Program Files (x86)\EasyAntiCheat\EasyAntiCheat.exe" -ThrottleRateActionBitsPerSecond 83⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:564
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" New-NetQosPolicy -Name "YYYYY" -AppPathNameMatchCondition "C:\Program Files (x86)\Common Files\BattlEye\BEService.exe" -ThrottleRateActionBitsPerSecond 83⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop wdfilter3⤵PID:2412
-
C:\Windows\system32\sc.exesc stop wdfilter4⤵
- Launches sc.exe
PID:2416
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop faceit3⤵PID:1912
-
C:\Windows\system32\sc.exesc stop faceit4⤵
- Launches sc.exe
PID:3024
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bceeda17-e57f-47a7-8c0c-1ae93f782e87.bat"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\system32\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\ab3233851d7f29ea66074a9a50a59540N.exe"3⤵
- Views/modifies file attributes
PID:2840
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "HiberbootEnabled" /t REG_DWORD /d 0 /f3⤵PID:1072
-
-
C:\Windows\system32\timeout.exetimeout /T 13⤵
- Delays execution with timeout.exe
PID:1664
-
-
C:\Windows\system32\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\ab3233851d7f29ea66074a9a50a59540N.exe"3⤵
- Views/modifies file attributes
PID:984
-
-
C:\Windows\system32\wevtutil.exewevtutil el3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
-
C:\Windows\system32\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\bceeda17-e57f-47a7-8c0c-1ae93f782e87.bat"3⤵
- Views/modifies file attributes
PID:2024
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
652B
MD593a9a38bd9653e6dd2329fd018c2c27b
SHA1d749a61afa8012e9eb0c3b0872fcb0324432342b
SHA25671092f87a2757c4f46cc3bb87ed1b4161a6b05f67f57f82d77fbd45feb4385cd
SHA51278ed6e29e22e19a717f6e1de1dbade25b55ec0ac394711e24cda35923fca703963a48577c5e66da559acea98eb2d6a82f4c5c5f90acf6e32e0746bb2bb5b378c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5cbed48f10136a06a2d72ef658204c512
SHA160a3975ea516909ada982badc71c87bf78a17b4f
SHA256981e7a03ea4db881fb5ac3edce3c0f726388c472981ef168d3250d10b0632901
SHA5120f28fe94f9b75bea86435df94cd0467e1f24555958c76b99b64aa44ed3d60cdc345173eec3a86ba815a59bdef255fbd6fef78058289e7f6eeab0203b0c0e264e
-
Filesize
263B
MD53c162df5e709ff6d99f82c2fb0b2fdc4
SHA1940bd2d7bab4e6b9e8c4d7734c6f102d952338cd
SHA256c2d77a02704db553164b2f88e714be3a8956f094fc90935ee41e10f9ac6460f0
SHA5127994745fe5ec0bc7dda9c26129194357143d522ca77e00cfbcfc219ae00182d2d055f373a75145f8717813ef9164968f68c0a5719e32d7ab4d0732661a16241a
-
Filesize
331KB
MD52c94d2cdfda021c89fcabd7ce0d3fcb5
SHA1f759c5b8cbaef2d6f901796dd13fe11ddba0e5a0
SHA256ae941cc76e7254060e3f729980a9c2c35d77ed11cf7284d654300a168650b257
SHA512bd2673a9ac9889ae79ebe8a743ce5c8079126ae8be3cdd30274ac7603ad51eb535291cf2485a982dc16cd14b27ab4d24ae801d5bc3adc338f415cdfe0f2039f8