Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
04/10/2023, 22:44
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
1.9MB
-
MD5
6db63c6b9d5da292e3fcd36f9f8a0b33
-
SHA1
7530690b0f7301a15330da001a45d84a04d976ad
-
SHA256
00a710cbb0b3f38fd05729d07b7a5663b8f284bd2cf1c456db6b5a6ad316db1d
-
SHA512
59cb2446890c31e6f1a94fce446beecd0cc584d1c1e05620e192dc10ca2f95954a716760352914c5b569a7f7fe30e136624e9ad6353ae1855243100ed73a5f14
-
SSDEEP
49152:3m8Sm5JHVu8j4dshIEB3yaRkzzUef5CDpct9tGdutuOGUU:2m5JHfr/B3NezUeIYmutuOG
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 2020 NT4gC88.exe 2336 DE2mI47.exe 2664 yC8jL66.exe 2748 1rW57hT8.exe -
Loads dropped DLL 13 IoCs
pid Process 1100 file.exe 2020 NT4gC88.exe 2020 NT4gC88.exe 2336 DE2mI47.exe 2336 DE2mI47.exe 2664 yC8jL66.exe 2664 yC8jL66.exe 2664 yC8jL66.exe 2748 1rW57hT8.exe 2796 WerFault.exe 2796 WerFault.exe 2796 WerFault.exe 2796 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" NT4gC88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" DE2mI47.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" yC8jL66.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2748 set thread context of 2656 2748 1rW57hT8.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2796 2748 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2656 AppLaunch.exe 2656 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2656 AppLaunch.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1100 wrote to memory of 2020 1100 file.exe 28 PID 1100 wrote to memory of 2020 1100 file.exe 28 PID 1100 wrote to memory of 2020 1100 file.exe 28 PID 1100 wrote to memory of 2020 1100 file.exe 28 PID 1100 wrote to memory of 2020 1100 file.exe 28 PID 1100 wrote to memory of 2020 1100 file.exe 28 PID 1100 wrote to memory of 2020 1100 file.exe 28 PID 2020 wrote to memory of 2336 2020 NT4gC88.exe 29 PID 2020 wrote to memory of 2336 2020 NT4gC88.exe 29 PID 2020 wrote to memory of 2336 2020 NT4gC88.exe 29 PID 2020 wrote to memory of 2336 2020 NT4gC88.exe 29 PID 2020 wrote to memory of 2336 2020 NT4gC88.exe 29 PID 2020 wrote to memory of 2336 2020 NT4gC88.exe 29 PID 2020 wrote to memory of 2336 2020 NT4gC88.exe 29 PID 2336 wrote to memory of 2664 2336 DE2mI47.exe 30 PID 2336 wrote to memory of 2664 2336 DE2mI47.exe 30 PID 2336 wrote to memory of 2664 2336 DE2mI47.exe 30 PID 2336 wrote to memory of 2664 2336 DE2mI47.exe 30 PID 2336 wrote to memory of 2664 2336 DE2mI47.exe 30 PID 2336 wrote to memory of 2664 2336 DE2mI47.exe 30 PID 2336 wrote to memory of 2664 2336 DE2mI47.exe 30 PID 2664 wrote to memory of 2748 2664 yC8jL66.exe 31 PID 2664 wrote to memory of 2748 2664 yC8jL66.exe 31 PID 2664 wrote to memory of 2748 2664 yC8jL66.exe 31 PID 2664 wrote to memory of 2748 2664 yC8jL66.exe 31 PID 2664 wrote to memory of 2748 2664 yC8jL66.exe 31 PID 2664 wrote to memory of 2748 2664 yC8jL66.exe 31 PID 2664 wrote to memory of 2748 2664 yC8jL66.exe 31 PID 2748 wrote to memory of 2656 2748 1rW57hT8.exe 32 PID 2748 wrote to memory of 2656 2748 1rW57hT8.exe 32 PID 2748 wrote to memory of 2656 2748 1rW57hT8.exe 32 PID 2748 wrote to memory of 2656 2748 1rW57hT8.exe 32 PID 2748 wrote to memory of 2656 2748 1rW57hT8.exe 32 PID 2748 wrote to memory of 2656 2748 1rW57hT8.exe 32 PID 2748 wrote to memory of 2656 2748 1rW57hT8.exe 32 PID 2748 wrote to memory of 2656 2748 1rW57hT8.exe 32 PID 2748 wrote to memory of 2656 2748 1rW57hT8.exe 32 PID 2748 wrote to memory of 2656 2748 1rW57hT8.exe 32 PID 2748 wrote to memory of 2656 2748 1rW57hT8.exe 32 PID 2748 wrote to memory of 2656 2748 1rW57hT8.exe 32 PID 2748 wrote to memory of 2656 2748 1rW57hT8.exe 32 PID 2748 wrote to memory of 2796 2748 1rW57hT8.exe 33 PID 2748 wrote to memory of 2796 2748 1rW57hT8.exe 33 PID 2748 wrote to memory of 2796 2748 1rW57hT8.exe 33 PID 2748 wrote to memory of 2796 2748 1rW57hT8.exe 33 PID 2748 wrote to memory of 2796 2748 1rW57hT8.exe 33 PID 2748 wrote to memory of 2796 2748 1rW57hT8.exe 33 PID 2748 wrote to memory of 2796 2748 1rW57hT8.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NT4gC88.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NT4gC88.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\DE2mI47.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\DE2mI47.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\yC8jL66.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\yC8jL66.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1rW57hT8.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1rW57hT8.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 2846⤵
- Loads dropped DLL
- Program crash
PID:2796
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5762fc98000d3c80ff1e36b38b001ad20
SHA1222374f08d356fda8038533886bb74971551b26a
SHA256b99e0fd5fbd51bd25cb41cacba4bbefc6482202f0c65ded59c9bb2c56c004dad
SHA5126320481e2c14004fd90cc87cd6224e5aef3d64a07bf2389457809cd449ce52476b0793958d334743c31db00e85b23fce6e27addb2e2c3bc925badbdbc6fd384e
-
Filesize
1.7MB
MD5762fc98000d3c80ff1e36b38b001ad20
SHA1222374f08d356fda8038533886bb74971551b26a
SHA256b99e0fd5fbd51bd25cb41cacba4bbefc6482202f0c65ded59c9bb2c56c004dad
SHA5126320481e2c14004fd90cc87cd6224e5aef3d64a07bf2389457809cd449ce52476b0793958d334743c31db00e85b23fce6e27addb2e2c3bc925badbdbc6fd384e
-
Filesize
1.2MB
MD542337f958a56664bf8c6e3942bbc0498
SHA14481d07c11df796864c3e38c13295962fd0bdaa1
SHA2564fdbbc79087f53a4bc72dbaaa292f5eb6e74612a42df6a8f6dcedc9d393cf4b8
SHA51205e16f8201523647b05b70a9839486d57833898d65b8b5bb6adc0c23a7fa3fbc3d6c446d49b68abc69e5d02168a14a44ceb0e25beb57c2a4c745c6080aad78f1
-
Filesize
1.2MB
MD542337f958a56664bf8c6e3942bbc0498
SHA14481d07c11df796864c3e38c13295962fd0bdaa1
SHA2564fdbbc79087f53a4bc72dbaaa292f5eb6e74612a42df6a8f6dcedc9d393cf4b8
SHA51205e16f8201523647b05b70a9839486d57833898d65b8b5bb6adc0c23a7fa3fbc3d6c446d49b68abc69e5d02168a14a44ceb0e25beb57c2a4c745c6080aad78f1
-
Filesize
748KB
MD508772f121227fb3019a297bd1db02cd4
SHA116bdd019c27ac07b56dbbceea30ca33e04ef6ae2
SHA2566401088e39243a88c2c063a09bc1e180bd33508e1f7951d7793f16fe093854d4
SHA5126a8dba8f3994cc1e479a776a1f32ace18683ce419973a192ad5ebe129ec5b62d7a3d022c227ea0612c2292673a243c65fc525224025f08001c3b67bdce9853f1
-
Filesize
748KB
MD508772f121227fb3019a297bd1db02cd4
SHA116bdd019c27ac07b56dbbceea30ca33e04ef6ae2
SHA2566401088e39243a88c2c063a09bc1e180bd33508e1f7951d7793f16fe093854d4
SHA5126a8dba8f3994cc1e479a776a1f32ace18683ce419973a192ad5ebe129ec5b62d7a3d022c227ea0612c2292673a243c65fc525224025f08001c3b67bdce9853f1
-
Filesize
1.8MB
MD575bb4e4db499e0c66c7358cc80a98eb9
SHA19106c6dcb82780dfd4396e837921c5af1ab58ed7
SHA256a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85
SHA5120e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220
-
Filesize
1.8MB
MD575bb4e4db499e0c66c7358cc80a98eb9
SHA19106c6dcb82780dfd4396e837921c5af1ab58ed7
SHA256a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85
SHA5120e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220
-
Filesize
1.8MB
MD575bb4e4db499e0c66c7358cc80a98eb9
SHA19106c6dcb82780dfd4396e837921c5af1ab58ed7
SHA256a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85
SHA5120e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220
-
Filesize
1.7MB
MD5762fc98000d3c80ff1e36b38b001ad20
SHA1222374f08d356fda8038533886bb74971551b26a
SHA256b99e0fd5fbd51bd25cb41cacba4bbefc6482202f0c65ded59c9bb2c56c004dad
SHA5126320481e2c14004fd90cc87cd6224e5aef3d64a07bf2389457809cd449ce52476b0793958d334743c31db00e85b23fce6e27addb2e2c3bc925badbdbc6fd384e
-
Filesize
1.7MB
MD5762fc98000d3c80ff1e36b38b001ad20
SHA1222374f08d356fda8038533886bb74971551b26a
SHA256b99e0fd5fbd51bd25cb41cacba4bbefc6482202f0c65ded59c9bb2c56c004dad
SHA5126320481e2c14004fd90cc87cd6224e5aef3d64a07bf2389457809cd449ce52476b0793958d334743c31db00e85b23fce6e27addb2e2c3bc925badbdbc6fd384e
-
Filesize
1.2MB
MD542337f958a56664bf8c6e3942bbc0498
SHA14481d07c11df796864c3e38c13295962fd0bdaa1
SHA2564fdbbc79087f53a4bc72dbaaa292f5eb6e74612a42df6a8f6dcedc9d393cf4b8
SHA51205e16f8201523647b05b70a9839486d57833898d65b8b5bb6adc0c23a7fa3fbc3d6c446d49b68abc69e5d02168a14a44ceb0e25beb57c2a4c745c6080aad78f1
-
Filesize
1.2MB
MD542337f958a56664bf8c6e3942bbc0498
SHA14481d07c11df796864c3e38c13295962fd0bdaa1
SHA2564fdbbc79087f53a4bc72dbaaa292f5eb6e74612a42df6a8f6dcedc9d393cf4b8
SHA51205e16f8201523647b05b70a9839486d57833898d65b8b5bb6adc0c23a7fa3fbc3d6c446d49b68abc69e5d02168a14a44ceb0e25beb57c2a4c745c6080aad78f1
-
Filesize
748KB
MD508772f121227fb3019a297bd1db02cd4
SHA116bdd019c27ac07b56dbbceea30ca33e04ef6ae2
SHA2566401088e39243a88c2c063a09bc1e180bd33508e1f7951d7793f16fe093854d4
SHA5126a8dba8f3994cc1e479a776a1f32ace18683ce419973a192ad5ebe129ec5b62d7a3d022c227ea0612c2292673a243c65fc525224025f08001c3b67bdce9853f1
-
Filesize
748KB
MD508772f121227fb3019a297bd1db02cd4
SHA116bdd019c27ac07b56dbbceea30ca33e04ef6ae2
SHA2566401088e39243a88c2c063a09bc1e180bd33508e1f7951d7793f16fe093854d4
SHA5126a8dba8f3994cc1e479a776a1f32ace18683ce419973a192ad5ebe129ec5b62d7a3d022c227ea0612c2292673a243c65fc525224025f08001c3b67bdce9853f1
-
Filesize
1.8MB
MD575bb4e4db499e0c66c7358cc80a98eb9
SHA19106c6dcb82780dfd4396e837921c5af1ab58ed7
SHA256a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85
SHA5120e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220
-
Filesize
1.8MB
MD575bb4e4db499e0c66c7358cc80a98eb9
SHA19106c6dcb82780dfd4396e837921c5af1ab58ed7
SHA256a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85
SHA5120e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220
-
Filesize
1.8MB
MD575bb4e4db499e0c66c7358cc80a98eb9
SHA19106c6dcb82780dfd4396e837921c5af1ab58ed7
SHA256a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85
SHA5120e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220
-
Filesize
1.8MB
MD575bb4e4db499e0c66c7358cc80a98eb9
SHA19106c6dcb82780dfd4396e837921c5af1ab58ed7
SHA256a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85
SHA5120e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220
-
Filesize
1.8MB
MD575bb4e4db499e0c66c7358cc80a98eb9
SHA19106c6dcb82780dfd4396e837921c5af1ab58ed7
SHA256a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85
SHA5120e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220
-
Filesize
1.8MB
MD575bb4e4db499e0c66c7358cc80a98eb9
SHA19106c6dcb82780dfd4396e837921c5af1ab58ed7
SHA256a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85
SHA5120e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220
-
Filesize
1.8MB
MD575bb4e4db499e0c66c7358cc80a98eb9
SHA19106c6dcb82780dfd4396e837921c5af1ab58ed7
SHA256a8a7c40fcbe01e808288551bcd6ce720d5f32159492db087ba8b2aed30885b85
SHA5120e4920b3e28408bcc9685b23e074038708a65bc7a0a3d65ef7e90f172bfc722d5b92fe704461879026c12631b472c232af56fdfbd44abbb27822b56dfa283220