Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2023, 12:12
Static task
static1
Behavioral task
behavioral1
Sample
07324499.exe
Resource
win7-20230220-en
5 signatures
150 seconds
General
-
Target
07324499.exe
-
Size
100KB
-
MD5
75e3cb035b131fd6624e9b66ea415a11
-
SHA1
31b1954bfa557b26638963616b2f72dc7e8a2dad
-
SHA256
b38af14f5dc0ea634ca5a243c87de898a6296b6d182b638017e6715bb55659ba
-
SHA512
3d7aee5670e3f1d991ae4d040f2e5bb39ff0d9f4cda60f0a4609bff2b8d865b8ee0ee6b8ec023a052b68e6b9092b6cd7cf06780f14f749e9a153180db1cb7a95
-
SSDEEP
1536:mp6kFya9c7Ok/YNQjgB75eGFILiSPjyXX9di2YTHLYjzDm:eVBQU1UiSPjyHxYTHcj/
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2736 set thread context of 5072 2736 07324499.exe 82 -
Program crash 1 IoCs
pid pid_target Process procid_target 4268 2736 WerFault.exe 80 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5072 AppLaunch.exe 5072 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5072 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2736 wrote to memory of 5072 2736 07324499.exe 82 PID 2736 wrote to memory of 5072 2736 07324499.exe 82 PID 2736 wrote to memory of 5072 2736 07324499.exe 82 PID 2736 wrote to memory of 5072 2736 07324499.exe 82 PID 2736 wrote to memory of 5072 2736 07324499.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\07324499.exe"C:\Users\Admin\AppData\Local\Temp\07324499.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 2522⤵
- Program crash
PID:4268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2736 -ip 27361⤵PID:4644