Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 18:57
Static task
static1
Behavioral task
behavioral1
Sample
95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe
Resource
win7-20240903-en
General
-
Target
95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe
-
Size
353KB
-
MD5
a6a41a4f8302e72a074e8f688715b460
-
SHA1
02f31f2a7868de9670e3eab243e541fd99917cf7
-
SHA256
95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788a
-
SHA512
01b0d3db94c5e34efe86adc77a8daa1fff6db97bde2b1a2d72be768f347be672d383de25f4065ac0e7effe1ff929ddffaf182491612fcab17923f67880715cee
-
SSDEEP
6144:YeC4EwZFoobUk8qp0qpgogZfpjkNY8UKw:8fhuLwflk7Ub
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 13tgwxyd.bat Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 13tgwxyd.bat Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 13tgwxyd.bat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation 95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation 13tgwxyd.bat -
Executes dropped EXE 1 IoCs
pid Process 1728 13tgwxyd.bat -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 13tgwxyd.bat -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23 api.ipify.org 22 api.ipify.org -
Launches sc.exe 16 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2132 sc.exe 1048 sc.exe 2268 sc.exe 4660 sc.exe 1436 sc.exe 3228 sc.exe 1844 sc.exe 1696 sc.exe 4244 sc.exe 3088 sc.exe 1036 sc.exe 4504 sc.exe 3672 sc.exe 3712 sc.exe 4856 sc.exe 5096 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 228 timeout.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings 95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2560 95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe 2560 95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe 2560 95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat 1728 13tgwxyd.bat -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2560 95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe Token: SeDebugPrivilege 1728 13tgwxyd.bat Token: SeSecurityPrivilege 4140 wevtutil.exe Token: SeBackupPrivilege 4140 wevtutil.exe Token: SeDebugPrivilege 3680 powershell.exe Token: SeDebugPrivilege 2344 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2560 wrote to memory of 3712 2560 95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe 82 PID 2560 wrote to memory of 3712 2560 95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe 82 PID 2560 wrote to memory of 4856 2560 95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe 84 PID 2560 wrote to memory of 4856 2560 95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe 84 PID 2560 wrote to memory of 4844 2560 95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe 86 PID 2560 wrote to memory of 4844 2560 95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe 86 PID 2560 wrote to memory of 1696 2560 95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe 88 PID 2560 wrote to memory of 1696 2560 95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe 88 PID 4844 wrote to memory of 4244 4844 cmd.exe 90 PID 4844 wrote to memory of 4244 4844 cmd.exe 90 PID 2560 wrote to memory of 1728 2560 95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe 91 PID 2560 wrote to memory of 1728 2560 95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe 91 PID 2560 wrote to memory of 4264 2560 95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe 92 PID 2560 wrote to memory of 4264 2560 95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe 92 PID 1728 wrote to memory of 3088 1728 13tgwxyd.bat 94 PID 1728 wrote to memory of 3088 1728 13tgwxyd.bat 94 PID 1728 wrote to memory of 1036 1728 13tgwxyd.bat 95 PID 1728 wrote to memory of 1036 1728 13tgwxyd.bat 95 PID 4264 wrote to memory of 2688 4264 cmd.exe 98 PID 4264 wrote to memory of 2688 4264 cmd.exe 98 PID 4264 wrote to memory of 1300 4264 cmd.exe 99 PID 4264 wrote to memory of 1300 4264 cmd.exe 99 PID 4264 wrote to memory of 228 4264 cmd.exe 100 PID 4264 wrote to memory of 228 4264 cmd.exe 100 PID 1728 wrote to memory of 2288 1728 13tgwxyd.bat 101 PID 1728 wrote to memory of 2288 1728 13tgwxyd.bat 101 PID 1728 wrote to memory of 3228 1728 13tgwxyd.bat 103 PID 1728 wrote to memory of 3228 1728 13tgwxyd.bat 103 PID 2288 wrote to memory of 4660 2288 cmd.exe 106 PID 2288 wrote to memory of 4660 2288 cmd.exe 106 PID 1728 wrote to memory of 2080 1728 13tgwxyd.bat 107 PID 1728 wrote to memory of 2080 1728 13tgwxyd.bat 107 PID 1728 wrote to memory of 2132 1728 13tgwxyd.bat 109 PID 1728 wrote to memory of 2132 1728 13tgwxyd.bat 109 PID 1728 wrote to memory of 2236 1728 13tgwxyd.bat 110 PID 1728 wrote to memory of 2236 1728 13tgwxyd.bat 110 PID 4264 wrote to memory of 1028 4264 cmd.exe 113 PID 4264 wrote to memory of 1028 4264 cmd.exe 113 PID 2080 wrote to memory of 1436 2080 cmd.exe 114 PID 2080 wrote to memory of 1436 2080 cmd.exe 114 PID 2236 wrote to memory of 1048 2236 cmd.exe 115 PID 2236 wrote to memory of 1048 2236 cmd.exe 115 PID 4264 wrote to memory of 4140 4264 cmd.exe 116 PID 4264 wrote to memory of 4140 4264 cmd.exe 116 PID 1728 wrote to memory of 364 1728 13tgwxyd.bat 117 PID 1728 wrote to memory of 364 1728 13tgwxyd.bat 117 PID 1728 wrote to memory of 4504 1728 13tgwxyd.bat 119 PID 1728 wrote to memory of 4504 1728 13tgwxyd.bat 119 PID 364 wrote to memory of 2268 364 cmd.exe 121 PID 364 wrote to memory of 2268 364 cmd.exe 121 PID 1728 wrote to memory of 1292 1728 13tgwxyd.bat 122 PID 1728 wrote to memory of 1292 1728 13tgwxyd.bat 122 PID 1292 wrote to memory of 1844 1292 cmd.exe 124 PID 1292 wrote to memory of 1844 1292 cmd.exe 124 PID 4264 wrote to memory of 3508 4264 cmd.exe 125 PID 4264 wrote to memory of 3508 4264 cmd.exe 125 PID 1728 wrote to memory of 3680 1728 13tgwxyd.bat 126 PID 1728 wrote to memory of 3680 1728 13tgwxyd.bat 126 PID 1728 wrote to memory of 2344 1728 13tgwxyd.bat 128 PID 1728 wrote to memory of 2344 1728 13tgwxyd.bat 128 PID 1728 wrote to memory of 448 1728 13tgwxyd.bat 130 PID 1728 wrote to memory of 448 1728 13tgwxyd.bat 130 PID 1728 wrote to memory of 3280 1728 13tgwxyd.bat 132 PID 1728 wrote to memory of 3280 1728 13tgwxyd.bat 132 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 2688 attrib.exe 1028 attrib.exe 3508 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe"C:\Users\Admin\AppData\Local\Temp\95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Checks computer location settings
- Windows security modification
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config wdfilter start=disabled2⤵
- Launches sc.exe
PID:3712
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config WerSvc start=disabled2⤵
- Launches sc.exe
PID:4856
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop wdfilter2⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\system32\sc.exesc stop wdfilter3⤵
- Launches sc.exe
PID:4244
-
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config WinDefend start=disabled2⤵
- Launches sc.exe
PID:1696
-
-
C:\Users\Admin\AppData\Local\Temp\13tgwxyd.bat"C:\Users\Admin\AppData\Local\Temp\13tgwxyd.bat" ok2⤵
- Modifies Windows Defender Real-time Protection settings
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config WerSvc start=disabled3⤵
- Launches sc.exe
PID:3088
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config wdfilter start=disabled3⤵
- Launches sc.exe
PID:1036
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop wdfilter3⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\system32\sc.exesc stop wdfilter4⤵
- Launches sc.exe
PID:4660
-
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config WinDefend start=disabled3⤵
- Launches sc.exe
PID:3228
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop WerSvc3⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\system32\sc.exesc stop WerSvc4⤵
- Launches sc.exe
PID:1436
-
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config WdNisSvc start=disabled3⤵
- Launches sc.exe
PID:2132
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop WinDefend3⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\system32\sc.exesc stop WinDefend4⤵
- Launches sc.exe
PID:1048
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop WdNisSvc3⤵
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\system32\sc.exesc stop WdNisSvc4⤵
- Launches sc.exe
PID:2268
-
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config XblGameSave start=disabled3⤵
- Launches sc.exe
PID:4504
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop XblGameSave3⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\system32\sc.exesc stop XblGameSave4⤵
- Launches sc.exe
PID:1844
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" New-NetQosPolicy -Name "XXXXX" -AppPathNameMatchCondition "C:\Program Files (x86)\EasyAntiCheat\EasyAntiCheat.exe" -ThrottleRateActionBitsPerSecond 83⤵
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" New-NetQosPolicy -Name "YYYYY" -AppPathNameMatchCondition "C:\Program Files (x86)\Common Files\BattlEye\BEService.exe" -ThrottleRateActionBitsPerSecond 83⤵
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop wdfilter3⤵PID:448
-
C:\Windows\system32\sc.exesc stop wdfilter4⤵
- Launches sc.exe
PID:3672
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop faceit3⤵PID:3280
-
C:\Windows\system32\sc.exesc stop faceit4⤵
- Launches sc.exe
PID:5096
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\505a0e60-68ad-4f6f-ba5e-d1fb0816793d.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\system32\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe"3⤵
- Views/modifies file attributes
PID:2688
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "HiberbootEnabled" /t REG_DWORD /d 0 /f3⤵PID:1300
-
-
C:\Windows\system32\timeout.exetimeout /T 13⤵
- Delays execution with timeout.exe
PID:228
-
-
C:\Windows\system32\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\95f0dd8e57251dae192a6297c5ceabaec88735962954084c2f68e58e0a4b788aN.exe"3⤵
- Views/modifies file attributes
PID:1028
-
-
C:\Windows\system32\wevtutil.exewevtutil el3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
-
C:\Windows\system32\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\505a0e60-68ad-4f6f-ba5e-d1fb0816793d.bat"3⤵
- Views/modifies file attributes
PID:3508
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
948B
MD5c1a54dd5a1ab44cc4c4afd42f291c863
SHA1b77043ab3582680fc96192e9d333a6be0ae0f69d
SHA256c6dce870a896f3531ae7a10a0c2096d2eb7eb5989ae783aefea6150279502d75
SHA512010f5093f58b0393d17c824a357513cf4f06239ccddd86c2e0581347ef3b8e7b93f869b0770bdaeb000e4fda7e14f49b9e45663a3839ab049446e9fe08ec535d
-
Filesize
354KB
MD51d5069f293f3f8b375f4f55c1fbf3256
SHA1e16f26c0455fd3c44a10e5f33ee1f743abb298b3
SHA256266a7e31c1f6d331e866a50c303d8556e732acaf77e3b79c9c3d5e0691f0ae00
SHA512d84960a091bec45990164014d2ae770b836adf44247027e64cf57f9a87cbc0c13ab40b20dbcb5dc7236fef37ca96455b54e300a4091369f9eb18282a55578248
-
Filesize
780B
MD5dcb591d59be814d62b266f6b51f8a6de
SHA1df9d860da8612d70267ce6a1082a1dacec2ce9ab
SHA256fe586650955c564b0ec089422ff64bab3075460c1f7a15b6a6f9d92dfd0ff59b
SHA512d8c9ea1f427fc7d8e5721b415dc4a43d35e9a9d9a045a4f24c09d9b83e130aa2f1f13d10492c41edb22b26af15623b4ad42fbe2af7cb8ea2fda8555375f373d5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
271B
MD5a048c19b378e5e4f7f7221e5e6db7fc4
SHA10e7f3a4d831f2ff0c90aa61890f13267306f3f2b
SHA256d281bed52308d703a39a5055d12dfe4b499574d501fcf0396dab260cb0380e20
SHA512225ca8092557d3a2c8565d75ec72c3b2cfd5c7966a68d0b85ff4d8dd87fa328eb2d76a0f4ccc31fb3fc6f15c6d5581e1c5b978503f5054ddb5046a7e867c14cd