Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1146s -
max time network
1155s -
platform
windows7_x64 -
resource
win7-20230705-es -
resource tags
arch:x64arch:x86image:win7-20230705-eslocale:es-esos:windows7-x64systemwindows -
submitted
08/07/2023, 12:35
Static task
static1
Behavioral task
behavioral1
Sample
LegacyLauncher_Installer_legacy.exe
Resource
win7-20230705-es
General
-
Target
LegacyLauncher_Installer_legacy.exe
-
Size
112.3MB
-
MD5
53eea8664d54198e1989301b12f795da
-
SHA1
00bddca8bba387a76d6f18fc942859acf9ff5a60
-
SHA256
a7c997ba3c3e91c048f80f96f08754948428f6d3fe4001bab79c4ae09d06c5e0
-
SHA512
e05bd2e369b19b818f715a14ceb2c35b2f8409e5524d347d3093ef82667675bf719af17ab77412156aa62748aa17572d622b163bb6d187d917282f49e56ff831
-
SSDEEP
3145728:kNS0yY1k/bQS8yJQZI3XeKBPKi2O3hE4AGzUVeQgnFV:koqcQ+3XHD2OxEfPQQgnFV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1452 LegacyLauncher_Installer_legacy.tmp -
Loads dropped DLL 1 IoCs
pid Process 1936 LegacyLauncher_Installer_legacy.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1452 LegacyLauncher_Installer_legacy.tmp -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2884 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2884 AUDIODG.EXE Token: 33 2884 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2884 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1936 wrote to memory of 1452 1936 LegacyLauncher_Installer_legacy.exe 41 PID 1936 wrote to memory of 1452 1936 LegacyLauncher_Installer_legacy.exe 41 PID 1936 wrote to memory of 1452 1936 LegacyLauncher_Installer_legacy.exe 41 PID 1936 wrote to memory of 1452 1936 LegacyLauncher_Installer_legacy.exe 41 PID 1936 wrote to memory of 1452 1936 LegacyLauncher_Installer_legacy.exe 41 PID 1936 wrote to memory of 1452 1936 LegacyLauncher_Installer_legacy.exe 41 PID 1936 wrote to memory of 1452 1936 LegacyLauncher_Installer_legacy.exe 41
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1396 --field-trial-handle=1252,i,14277715750014737885,16077389767893854875,131072 /prefetch:21⤵PID:2404
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --mojo-platform-channel-handle=2336 --field-trial-handle=1252,i,14277715750014737885,16077389767893854875,131072 /prefetch:11⤵PID:2580
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3780 --field-trial-handle=1252,i,14277715750014737885,16077389767893854875,131072 /prefetch:81⤵PID:2288
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3900 --field-trial-handle=1252,i,14277715750014737885,16077389767893854875,131072 /prefetch:81⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\LegacyLauncher_Installer_legacy.exe"C:\Users\Admin\AppData\Local\Temp\LegacyLauncher_Installer_legacy.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\is-Q7UBI.tmp\LegacyLauncher_Installer_legacy.tmp"C:\Users\Admin\AppData\Local\Temp\is-Q7UBI.tmp\LegacyLauncher_Installer_legacy.tmp" /SL5="$201C6,115841256,1202688,C:\Users\Admin\AppData\Local\Temp\LegacyLauncher_Installer_legacy.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:1452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --mojo-platform-channel-handle=4132 --field-trial-handle=1252,i,14277715750014737885,16077389767893854875,131072 /prefetch:11⤵PID:996
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=2504 --field-trial-handle=1252,i,14277715750014737885,16077389767893854875,131072 /prefetch:11⤵PID:1440
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --mojo-platform-channel-handle=2732 --field-trial-handle=1252,i,14277715750014737885,16077389767893854875,131072 /prefetch:11⤵PID:1076
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4504 --field-trial-handle=1252,i,14277715750014737885,16077389767893854875,131072 /prefetch:81⤵PID:2612
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4624 --field-trial-handle=1252,i,14277715750014737885,16077389767893854875,131072 /prefetch:81⤵PID:2776
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5e01⤵
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=4312 --field-trial-handle=1252,i,14277715750014737885,16077389767893854875,131072 /prefetch:11⤵PID:1712
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --mojo-platform-channel-handle=5092 --field-trial-handle=1252,i,14277715750014737885,16077389767893854875,131072 /prefetch:11⤵PID:396
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=3476 --field-trial-handle=1252,i,14277715750014737885,16077389767893854875,131072 /prefetch:11⤵PID:2164
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --mojo-platform-channel-handle=5084 --field-trial-handle=1252,i,14277715750014737885,16077389767893854875,131072 /prefetch:11⤵PID:2272
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 --field-trial-handle=1252,i,14277715750014737885,16077389767893854875,131072 /prefetch:81⤵PID:1780
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD507b96c2d1823a0a548832c1062799d85
SHA165a35826b0e6d93700256fd8a4710cc039bd7b8d
SHA256c5ba29e4c82fca9adfcd3a6b60b3bf786abe7178928f80cb60eca3564e35b3de
SHA512abf2ba63976bd6622f3a1cda816c8f2267b59c079d6092ff60e7f52be893a993e3b457a174092c74056628e9694fa9efc8d823d14b4d658a9eb59c622d992f65
-
Filesize
3.4MB
MD507b96c2d1823a0a548832c1062799d85
SHA165a35826b0e6d93700256fd8a4710cc039bd7b8d
SHA256c5ba29e4c82fca9adfcd3a6b60b3bf786abe7178928f80cb60eca3564e35b3de
SHA512abf2ba63976bd6622f3a1cda816c8f2267b59c079d6092ff60e7f52be893a993e3b457a174092c74056628e9694fa9efc8d823d14b4d658a9eb59c622d992f65