Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 02:26
Static task
static1
Behavioral task
behavioral1
Sample
b0fd306016252223fb1094e576bcc108.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b0fd306016252223fb1094e576bcc108.exe
Resource
win10v2004-20230915-en
General
-
Target
b0fd306016252223fb1094e576bcc108.exe
-
Size
1.1MB
-
MD5
b0fd306016252223fb1094e576bcc108
-
SHA1
d9b2dc3236372e40c234d57d4cc9f4867dd0dd03
-
SHA256
455d4700cbfce1bf289767e8294ae356063582bf79ce9128cd309ffd0364e4b1
-
SHA512
75e13ccec9ec4f3af4f292007775860e6ae0059c7db2453f9ca3bf4e7013b7fb0228e32eabd879e8e6681d15cecb5e6536e56095655fc3eaf6a437bdc0d28c95
-
SSDEEP
24576:dysCPSGhYG97v+Fdpg2u6IimZ93plRKgeOdXdPnY:4sCK1G97W5gTiW93N
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 2328 iW4xQ10.exe 2644 yY4Hb26.exe 2748 WX3GZ93.exe 2612 1RL62JJ9.exe -
Loads dropped DLL 12 IoCs
pid Process 1080 b0fd306016252223fb1094e576bcc108.exe 2328 iW4xQ10.exe 2328 iW4xQ10.exe 2644 yY4Hb26.exe 2644 yY4Hb26.exe 2748 WX3GZ93.exe 2748 WX3GZ93.exe 2612 1RL62JJ9.exe 2104 WerFault.exe 2104 WerFault.exe 2104 WerFault.exe 2104 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b0fd306016252223fb1094e576bcc108.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" iW4xQ10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" yY4Hb26.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" WX3GZ93.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2612 set thread context of 2692 2612 1RL62JJ9.exe 33 -
Program crash 1 IoCs
pid pid_target Process procid_target 2104 2612 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2692 AppLaunch.exe 2692 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2692 AppLaunch.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 1080 wrote to memory of 2328 1080 b0fd306016252223fb1094e576bcc108.exe 28 PID 1080 wrote to memory of 2328 1080 b0fd306016252223fb1094e576bcc108.exe 28 PID 1080 wrote to memory of 2328 1080 b0fd306016252223fb1094e576bcc108.exe 28 PID 1080 wrote to memory of 2328 1080 b0fd306016252223fb1094e576bcc108.exe 28 PID 1080 wrote to memory of 2328 1080 b0fd306016252223fb1094e576bcc108.exe 28 PID 1080 wrote to memory of 2328 1080 b0fd306016252223fb1094e576bcc108.exe 28 PID 1080 wrote to memory of 2328 1080 b0fd306016252223fb1094e576bcc108.exe 28 PID 2328 wrote to memory of 2644 2328 iW4xQ10.exe 29 PID 2328 wrote to memory of 2644 2328 iW4xQ10.exe 29 PID 2328 wrote to memory of 2644 2328 iW4xQ10.exe 29 PID 2328 wrote to memory of 2644 2328 iW4xQ10.exe 29 PID 2328 wrote to memory of 2644 2328 iW4xQ10.exe 29 PID 2328 wrote to memory of 2644 2328 iW4xQ10.exe 29 PID 2328 wrote to memory of 2644 2328 iW4xQ10.exe 29 PID 2644 wrote to memory of 2748 2644 yY4Hb26.exe 30 PID 2644 wrote to memory of 2748 2644 yY4Hb26.exe 30 PID 2644 wrote to memory of 2748 2644 yY4Hb26.exe 30 PID 2644 wrote to memory of 2748 2644 yY4Hb26.exe 30 PID 2644 wrote to memory of 2748 2644 yY4Hb26.exe 30 PID 2644 wrote to memory of 2748 2644 yY4Hb26.exe 30 PID 2644 wrote to memory of 2748 2644 yY4Hb26.exe 30 PID 2748 wrote to memory of 2612 2748 WX3GZ93.exe 31 PID 2748 wrote to memory of 2612 2748 WX3GZ93.exe 31 PID 2748 wrote to memory of 2612 2748 WX3GZ93.exe 31 PID 2748 wrote to memory of 2612 2748 WX3GZ93.exe 31 PID 2748 wrote to memory of 2612 2748 WX3GZ93.exe 31 PID 2748 wrote to memory of 2612 2748 WX3GZ93.exe 31 PID 2748 wrote to memory of 2612 2748 WX3GZ93.exe 31 PID 2612 wrote to memory of 2896 2612 1RL62JJ9.exe 32 PID 2612 wrote to memory of 2896 2612 1RL62JJ9.exe 32 PID 2612 wrote to memory of 2896 2612 1RL62JJ9.exe 32 PID 2612 wrote to memory of 2896 2612 1RL62JJ9.exe 32 PID 2612 wrote to memory of 2896 2612 1RL62JJ9.exe 32 PID 2612 wrote to memory of 2896 2612 1RL62JJ9.exe 32 PID 2612 wrote to memory of 2896 2612 1RL62JJ9.exe 32 PID 2612 wrote to memory of 2692 2612 1RL62JJ9.exe 33 PID 2612 wrote to memory of 2692 2612 1RL62JJ9.exe 33 PID 2612 wrote to memory of 2692 2612 1RL62JJ9.exe 33 PID 2612 wrote to memory of 2692 2612 1RL62JJ9.exe 33 PID 2612 wrote to memory of 2692 2612 1RL62JJ9.exe 33 PID 2612 wrote to memory of 2692 2612 1RL62JJ9.exe 33 PID 2612 wrote to memory of 2692 2612 1RL62JJ9.exe 33 PID 2612 wrote to memory of 2692 2612 1RL62JJ9.exe 33 PID 2612 wrote to memory of 2692 2612 1RL62JJ9.exe 33 PID 2612 wrote to memory of 2692 2612 1RL62JJ9.exe 33 PID 2612 wrote to memory of 2692 2612 1RL62JJ9.exe 33 PID 2612 wrote to memory of 2692 2612 1RL62JJ9.exe 33 PID 2612 wrote to memory of 2104 2612 1RL62JJ9.exe 34 PID 2612 wrote to memory of 2104 2612 1RL62JJ9.exe 34 PID 2612 wrote to memory of 2104 2612 1RL62JJ9.exe 34 PID 2612 wrote to memory of 2104 2612 1RL62JJ9.exe 34 PID 2612 wrote to memory of 2104 2612 1RL62JJ9.exe 34 PID 2612 wrote to memory of 2104 2612 1RL62JJ9.exe 34 PID 2612 wrote to memory of 2104 2612 1RL62JJ9.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0fd306016252223fb1094e576bcc108.exe"C:\Users\Admin\AppData\Local\Temp\b0fd306016252223fb1094e576bcc108.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\iW4xQ10.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\iW4xQ10.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\yY4Hb26.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\yY4Hb26.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\WX3GZ93.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\WX3GZ93.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1RL62JJ9.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1RL62JJ9.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2896
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 2926⤵
- Loads dropped DLL
- Program crash
PID:2104
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
958KB
MD5230d4d061117e78b05e47e61a5d8cd24
SHA1d46a3cd210452b40802e31f8a2a8f3472942615d
SHA256ef2265df4258704fd001f78defd1d4e213b982a7794472a0f59a9a6dce39413f
SHA5120e491a9c13a3b4e5fe0ad04e6aff5304b6313a53ba9792ac5a3bbe8409918056f214bc8c467c44802e2a458331560595c05d675e4bfb7928a638263475bb52e7
-
Filesize
958KB
MD5230d4d061117e78b05e47e61a5d8cd24
SHA1d46a3cd210452b40802e31f8a2a8f3472942615d
SHA256ef2265df4258704fd001f78defd1d4e213b982a7794472a0f59a9a6dce39413f
SHA5120e491a9c13a3b4e5fe0ad04e6aff5304b6313a53ba9792ac5a3bbe8409918056f214bc8c467c44802e2a458331560595c05d675e4bfb7928a638263475bb52e7
-
Filesize
657KB
MD5c8d1435e7c1ab2e98ad202dea578d441
SHA169b6ce977acfe665b72014f233e0e524357b5cde
SHA256ad3b21739a66858d51b79ce42f7890c027112d61cd8292a3c3fedef9f01bc91a
SHA51293636de2d83bdd05c6fb0047ff0fe14be7e059c3ba93f073e83529e4b52c809afd9ee3fe6314f3fcf03bfdf97ce58673f205928c9de9d04aa3981d9cd9e81358
-
Filesize
657KB
MD5c8d1435e7c1ab2e98ad202dea578d441
SHA169b6ce977acfe665b72014f233e0e524357b5cde
SHA256ad3b21739a66858d51b79ce42f7890c027112d61cd8292a3c3fedef9f01bc91a
SHA51293636de2d83bdd05c6fb0047ff0fe14be7e059c3ba93f073e83529e4b52c809afd9ee3fe6314f3fcf03bfdf97ce58673f205928c9de9d04aa3981d9cd9e81358
-
Filesize
402KB
MD54d75011fde8d873baafbb3b427f000ed
SHA1b19b5e7bc855155754618c94a756a4e5ff93f2ce
SHA2563bde7b56077f3b71ab57ba76418190b54bc4e1f78be278efb3d418b8f207dcaa
SHA5129c60ee8ceb5fa612543bba5759a087986b794c8465c0ac5f390d99b8fb877990fc28eeb6cf5701ab46e56fa2363c8691781447fc34f6ac6fc2db1f4f042f8fbc
-
Filesize
402KB
MD54d75011fde8d873baafbb3b427f000ed
SHA1b19b5e7bc855155754618c94a756a4e5ff93f2ce
SHA2563bde7b56077f3b71ab57ba76418190b54bc4e1f78be278efb3d418b8f207dcaa
SHA5129c60ee8ceb5fa612543bba5759a087986b794c8465c0ac5f390d99b8fb877990fc28eeb6cf5701ab46e56fa2363c8691781447fc34f6ac6fc2db1f4f042f8fbc
-
Filesize
279KB
MD57f3db03c10fe9b78f342013cf2e86a2c
SHA1d80ebe717b39733222e29effff84ca6a480d7a26
SHA256972deb24fea841d197793dc5e843d1e38b55f74ba9f13f334506a8bd342dddd1
SHA51228949008f1d2a0d1ec27487ad18e324847deb8bd2829957383d81f52e132cd6ef977674111430174b670674f7afb682bedc5d118f1ce02f47ab1c06d6033acb4
-
Filesize
279KB
MD57f3db03c10fe9b78f342013cf2e86a2c
SHA1d80ebe717b39733222e29effff84ca6a480d7a26
SHA256972deb24fea841d197793dc5e843d1e38b55f74ba9f13f334506a8bd342dddd1
SHA51228949008f1d2a0d1ec27487ad18e324847deb8bd2829957383d81f52e132cd6ef977674111430174b670674f7afb682bedc5d118f1ce02f47ab1c06d6033acb4
-
Filesize
958KB
MD5230d4d061117e78b05e47e61a5d8cd24
SHA1d46a3cd210452b40802e31f8a2a8f3472942615d
SHA256ef2265df4258704fd001f78defd1d4e213b982a7794472a0f59a9a6dce39413f
SHA5120e491a9c13a3b4e5fe0ad04e6aff5304b6313a53ba9792ac5a3bbe8409918056f214bc8c467c44802e2a458331560595c05d675e4bfb7928a638263475bb52e7
-
Filesize
958KB
MD5230d4d061117e78b05e47e61a5d8cd24
SHA1d46a3cd210452b40802e31f8a2a8f3472942615d
SHA256ef2265df4258704fd001f78defd1d4e213b982a7794472a0f59a9a6dce39413f
SHA5120e491a9c13a3b4e5fe0ad04e6aff5304b6313a53ba9792ac5a3bbe8409918056f214bc8c467c44802e2a458331560595c05d675e4bfb7928a638263475bb52e7
-
Filesize
657KB
MD5c8d1435e7c1ab2e98ad202dea578d441
SHA169b6ce977acfe665b72014f233e0e524357b5cde
SHA256ad3b21739a66858d51b79ce42f7890c027112d61cd8292a3c3fedef9f01bc91a
SHA51293636de2d83bdd05c6fb0047ff0fe14be7e059c3ba93f073e83529e4b52c809afd9ee3fe6314f3fcf03bfdf97ce58673f205928c9de9d04aa3981d9cd9e81358
-
Filesize
657KB
MD5c8d1435e7c1ab2e98ad202dea578d441
SHA169b6ce977acfe665b72014f233e0e524357b5cde
SHA256ad3b21739a66858d51b79ce42f7890c027112d61cd8292a3c3fedef9f01bc91a
SHA51293636de2d83bdd05c6fb0047ff0fe14be7e059c3ba93f073e83529e4b52c809afd9ee3fe6314f3fcf03bfdf97ce58673f205928c9de9d04aa3981d9cd9e81358
-
Filesize
402KB
MD54d75011fde8d873baafbb3b427f000ed
SHA1b19b5e7bc855155754618c94a756a4e5ff93f2ce
SHA2563bde7b56077f3b71ab57ba76418190b54bc4e1f78be278efb3d418b8f207dcaa
SHA5129c60ee8ceb5fa612543bba5759a087986b794c8465c0ac5f390d99b8fb877990fc28eeb6cf5701ab46e56fa2363c8691781447fc34f6ac6fc2db1f4f042f8fbc
-
Filesize
402KB
MD54d75011fde8d873baafbb3b427f000ed
SHA1b19b5e7bc855155754618c94a756a4e5ff93f2ce
SHA2563bde7b56077f3b71ab57ba76418190b54bc4e1f78be278efb3d418b8f207dcaa
SHA5129c60ee8ceb5fa612543bba5759a087986b794c8465c0ac5f390d99b8fb877990fc28eeb6cf5701ab46e56fa2363c8691781447fc34f6ac6fc2db1f4f042f8fbc
-
Filesize
279KB
MD57f3db03c10fe9b78f342013cf2e86a2c
SHA1d80ebe717b39733222e29effff84ca6a480d7a26
SHA256972deb24fea841d197793dc5e843d1e38b55f74ba9f13f334506a8bd342dddd1
SHA51228949008f1d2a0d1ec27487ad18e324847deb8bd2829957383d81f52e132cd6ef977674111430174b670674f7afb682bedc5d118f1ce02f47ab1c06d6033acb4
-
Filesize
279KB
MD57f3db03c10fe9b78f342013cf2e86a2c
SHA1d80ebe717b39733222e29effff84ca6a480d7a26
SHA256972deb24fea841d197793dc5e843d1e38b55f74ba9f13f334506a8bd342dddd1
SHA51228949008f1d2a0d1ec27487ad18e324847deb8bd2829957383d81f52e132cd6ef977674111430174b670674f7afb682bedc5d118f1ce02f47ab1c06d6033acb4
-
Filesize
279KB
MD57f3db03c10fe9b78f342013cf2e86a2c
SHA1d80ebe717b39733222e29effff84ca6a480d7a26
SHA256972deb24fea841d197793dc5e843d1e38b55f74ba9f13f334506a8bd342dddd1
SHA51228949008f1d2a0d1ec27487ad18e324847deb8bd2829957383d81f52e132cd6ef977674111430174b670674f7afb682bedc5d118f1ce02f47ab1c06d6033acb4
-
Filesize
279KB
MD57f3db03c10fe9b78f342013cf2e86a2c
SHA1d80ebe717b39733222e29effff84ca6a480d7a26
SHA256972deb24fea841d197793dc5e843d1e38b55f74ba9f13f334506a8bd342dddd1
SHA51228949008f1d2a0d1ec27487ad18e324847deb8bd2829957383d81f52e132cd6ef977674111430174b670674f7afb682bedc5d118f1ce02f47ab1c06d6033acb4
-
Filesize
279KB
MD57f3db03c10fe9b78f342013cf2e86a2c
SHA1d80ebe717b39733222e29effff84ca6a480d7a26
SHA256972deb24fea841d197793dc5e843d1e38b55f74ba9f13f334506a8bd342dddd1
SHA51228949008f1d2a0d1ec27487ad18e324847deb8bd2829957383d81f52e132cd6ef977674111430174b670674f7afb682bedc5d118f1ce02f47ab1c06d6033acb4
-
Filesize
279KB
MD57f3db03c10fe9b78f342013cf2e86a2c
SHA1d80ebe717b39733222e29effff84ca6a480d7a26
SHA256972deb24fea841d197793dc5e843d1e38b55f74ba9f13f334506a8bd342dddd1
SHA51228949008f1d2a0d1ec27487ad18e324847deb8bd2829957383d81f52e132cd6ef977674111430174b670674f7afb682bedc5d118f1ce02f47ab1c06d6033acb4