Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1618s
  • max time network
    1622s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01/04/2023, 14:03

General

  • Target

    https://tlauncher.org/en/

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 61 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://tlauncher.org/en/
    1⤵
    • Adds Run key to start application
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef66c9758,0x7fef66c9768,0x7fef66c9778
      2⤵
        PID:1468
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1364,i,11052728196712913512,4808395476330992640,131072 /prefetch:2
        2⤵
          PID:1448
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1544 --field-trial-handle=1364,i,11052728196712913512,4808395476330992640,131072 /prefetch:8
          2⤵
            PID:284
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1616 --field-trial-handle=1364,i,11052728196712913512,4808395476330992640,131072 /prefetch:8
            2⤵
              PID:1436
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2252 --field-trial-handle=1364,i,11052728196712913512,4808395476330992640,131072 /prefetch:1
              2⤵
                PID:628
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2264 --field-trial-handle=1364,i,11052728196712913512,4808395476330992640,131072 /prefetch:1
                2⤵
                  PID:1148
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3344 --field-trial-handle=1364,i,11052728196712913512,4808395476330992640,131072 /prefetch:2
                  2⤵
                    PID:892
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3240 --field-trial-handle=1364,i,11052728196712913512,4808395476330992640,131072 /prefetch:2
                    2⤵
                      PID:2100
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3852 --field-trial-handle=1364,i,11052728196712913512,4808395476330992640,131072 /prefetch:1
                      2⤵
                        PID:2432
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4676 --field-trial-handle=1364,i,11052728196712913512,4808395476330992640,131072 /prefetch:8
                        2⤵
                          PID:3008
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4572 --field-trial-handle=1364,i,11052728196712913512,4808395476330992640,131072 /prefetch:8
                          2⤵
                            PID:3000
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3648 --field-trial-handle=1364,i,11052728196712913512,4808395476330992640,131072 /prefetch:8
                            2⤵
                              PID:2068
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4764 --field-trial-handle=1364,i,11052728196712913512,4808395476330992640,131072 /prefetch:8
                              2⤵
                                PID:2220
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4748 --field-trial-handle=1364,i,11052728196712913512,4808395476330992640,131072 /prefetch:8
                                2⤵
                                  PID:2212
                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                1⤵
                                  PID:1300
                                • C:\Windows\system32\mmc.exe
                                  "C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /s
                                  1⤵
                                  • Drops file in System32 directory
                                  • Suspicious behavior: GetForegroundWindowSpam
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2780

                                Network

                                MITRE ATT&CK Enterprise v6

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  61KB

                                  MD5

                                  e71c8443ae0bc2e282c73faead0a6dd3

                                  SHA1

                                  0c110c1b01e68edfacaeae64781a37b1995fa94b

                                  SHA256

                                  95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

                                  SHA512

                                  b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                  Filesize

                                  264KB

                                  MD5

                                  f50f89a0a91564d0b8a211f8921aa7de

                                  SHA1

                                  112403a17dd69d5b9018b8cede023cb3b54eab7d

                                  SHA256

                                  b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                  SHA512

                                  bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000004.dbtmp

                                  Filesize

                                  16B

                                  MD5

                                  6752a1d65b201c13b62ea44016eb221f

                                  SHA1

                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                  SHA256

                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                  SHA512

                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  527B

                                  MD5

                                  a580ad2839071130bb7d6e048606dea7

                                  SHA1

                                  fc4a99986d6eae30b6d10a836436f314e2ae6e53

                                  SHA256

                                  675c56740c501aa643a8336d99acb1905769edc1611a0a86a5bf7e82083cded4

                                  SHA512

                                  1785eb3c0f62240c90c999e4c31540700913a9de804534b537c2f2ad0d5d7992f084e0f1b00eaeb51e151fbe60a2c8b0a5c73fe4126edb6e1d3ba3f4869dd110

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  690B

                                  MD5

                                  21ba69d53b1104ea71b97f33b219fd5e

                                  SHA1

                                  07ddfa2498dc1b6e574c2a49ddee863d63e6d7e2

                                  SHA256

                                  d8f5f7b4af5a9c0b23e9befbc607a9522a9136bd6e3e493ed31db7423c127f33

                                  SHA512

                                  60e8303f50a7fd2859d0f493cfd94bd019736264e09491454b918ddd1dccd2826f7f02a4555259c4db56daabb8fa142944d1448ec14ce40328b3589f1e59584f

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  4KB

                                  MD5

                                  9bac3d44fe20ac16c21da9894dc5bcf3

                                  SHA1

                                  6826e0b65800ada5c86df97613116c1d71a79c07

                                  SHA256

                                  1479557908dbcd90dfc8f0125c2aa7ec7e104a9cf27100c63cd02ec4bddb3316

                                  SHA512

                                  c8e9ea6d36dbdd6500f527be8d07cac05643a738d13f837e07eaf4e3bebae27a77009214f041bc03a887de6b9eade35f478d04ccc8cc13124d60ba5cd16a746c

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  4KB

                                  MD5

                                  d5b862563164c67a6c1c28063ad281ea

                                  SHA1

                                  007d0af21dcfb4841e3387e9d732c4f41cbe4026

                                  SHA256

                                  c62ced0f1b0eebe4c1fa4a6d380ab7b6ad7024e41b1732af004a6b3ecf9210d1

                                  SHA512

                                  14268fc3deb7001a6ff9b4daa88158ff35feefa11460079e6fa2ccf851f3f612a7438412ee3a3461690f193369c22b21a195bda9aa1d94ef0e2708cc0678b824

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  4KB

                                  MD5

                                  b2f12160d12d5aa14b0be34b6a9fe2ab

                                  SHA1

                                  e6eb6a9bde573dade51325dc73713fe307ddeec0

                                  SHA256

                                  2c5e8eaa7905eb14029139a99f0a9aa698d12abdf2566f29178d420835dceed4

                                  SHA512

                                  941af09a59a8bab7684ccc27558d6be525cddaa9b9c54ef6445bdb16244a850d9b260c4b9b6c60ead0cf8bcec17712951ada0d603b1b4f45ff95f47d23eb202c

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  173KB

                                  MD5

                                  fc3a7c10d0c7d32cecba8c583d7c352b

                                  SHA1

                                  27a690747b4a24e7bf45278654ab930a56982b22

                                  SHA256

                                  b305fbf87a5637c5a74d67238f1cf12b05b840ea8b41ad8bfaa53ed281c3b587

                                  SHA512

                                  b36abfa008e731a704a0ff28bfb0d5b01980f6c5774acd37cef36bf2dda85c02a348ea4acd35bdfb6cc6ed8a08e36d8247f102a3b2890557b0696142316e2ce8

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  173KB

                                  MD5

                                  9d5d824c469a5f39c62b5270f782afb8

                                  SHA1

                                  0470fd6480c985d2ee99d477f415a309f9c7e0fa

                                  SHA256

                                  5f17681a184f091c389f20f0fbdd08da98eb9d8fa650998071304977df679635

                                  SHA512

                                  b699147b31edaacb3250994737d5cd8ecd8d3ec5886b4ec1442b108cbb8b409c355e0130897d7dcd148a839e22a694d7bad58131295d25d0e5a292261de06560

                                • C:\Users\Admin\AppData\Local\Temp\Tar74DA.tmp

                                  Filesize

                                  161KB

                                  MD5

                                  be2bec6e8c5653136d3e72fe53c98aa3

                                  SHA1

                                  a8182d6db17c14671c3d5766c72e58d87c0810de

                                  SHA256

                                  1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

                                  SHA512

                                  0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

                                • C:\Users\Admin\Downloads\Unconfirmed 233790.crdownload

                                  Filesize

                                  22.6MB

                                  MD5

                                  51b145f86301e75e5108ca22403784f0

                                  SHA1

                                  e6990f2cf3f9d38b7458688509ce0e3f3ff5bf7d

                                  SHA256

                                  42a309cea201b01a1a135fd651fcbec0d079368ed34d5567d3cf3a3811b47266

                                  SHA512

                                  7848323b4761c8fdcd6456e6e98c67a1f41b5d40d0e9403a4d065b07c3eafaff50da936bd890ffcb092e51b39d8f71c66fa475542b4f95528cacf694e4a65e10

                                • memory/2780-235-0x0000000004390000-0x0000000004410000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/2780-239-0x000007FFFFF00000-0x000007FFFFF10000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/2780-240-0x0000000004390000-0x0000000004410000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/2780-238-0x0000000004390000-0x0000000004410000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/2780-237-0x0000000004390000-0x0000000004410000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/2780-236-0x0000000004390000-0x0000000004410000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/2780-234-0x000000001CF60000-0x000000001D2A6000-memory.dmp

                                  Filesize

                                  3.3MB

                                • memory/2780-233-0x0000000004390000-0x0000000004410000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/2780-232-0x0000000002270000-0x0000000002271000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2780-231-0x00000000027A0000-0x00000000027BE000-memory.dmp

                                  Filesize

                                  120KB