Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 06:34
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
1.0MB
-
MD5
1fc4d3ec7d08ed938a35f2c8d12b636b
-
SHA1
d4615dbe44fe85deeaf5fe4e8786c999f215c415
-
SHA256
0a5e2b14dcf776e9677e1f6fc5848658bf480a60e7dbb5e3050b2ac6b71f0456
-
SHA512
cf2e9361df4afc3e2bede2603c108939198bad913fe9e545411751dc654a0ad4b223b427c0ce5afab797fc54947e3e92be7b92bf97626c082630db9e06d65f0c
-
SSDEEP
12288:aMrxy90k9TgZgCkRxBFiaP/gt2y02cgosE7NqiRuxReG35C1v/UmGoFMAioisWJ8:zypKFYc028rzu3Rkv/Uf1oi+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 2208 To5mI99.exe 2036 UF3Qe28.exe 2704 GU6Bt51.exe 2936 1GB51vx2.exe -
Loads dropped DLL 12 IoCs
pid Process 1744 file.exe 2208 To5mI99.exe 2208 To5mI99.exe 2036 UF3Qe28.exe 2036 UF3Qe28.exe 2704 GU6Bt51.exe 2704 GU6Bt51.exe 2936 1GB51vx2.exe 2672 WerFault.exe 2672 WerFault.exe 2672 WerFault.exe 2672 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" To5mI99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" UF3Qe28.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" GU6Bt51.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2936 set thread context of 2812 2936 1GB51vx2.exe 33 -
Program crash 1 IoCs
pid pid_target Process procid_target 2672 2936 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2812 AppLaunch.exe 2812 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2812 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2208 1744 file.exe 28 PID 1744 wrote to memory of 2208 1744 file.exe 28 PID 1744 wrote to memory of 2208 1744 file.exe 28 PID 1744 wrote to memory of 2208 1744 file.exe 28 PID 1744 wrote to memory of 2208 1744 file.exe 28 PID 1744 wrote to memory of 2208 1744 file.exe 28 PID 1744 wrote to memory of 2208 1744 file.exe 28 PID 2208 wrote to memory of 2036 2208 To5mI99.exe 29 PID 2208 wrote to memory of 2036 2208 To5mI99.exe 29 PID 2208 wrote to memory of 2036 2208 To5mI99.exe 29 PID 2208 wrote to memory of 2036 2208 To5mI99.exe 29 PID 2208 wrote to memory of 2036 2208 To5mI99.exe 29 PID 2208 wrote to memory of 2036 2208 To5mI99.exe 29 PID 2208 wrote to memory of 2036 2208 To5mI99.exe 29 PID 2036 wrote to memory of 2704 2036 UF3Qe28.exe 30 PID 2036 wrote to memory of 2704 2036 UF3Qe28.exe 30 PID 2036 wrote to memory of 2704 2036 UF3Qe28.exe 30 PID 2036 wrote to memory of 2704 2036 UF3Qe28.exe 30 PID 2036 wrote to memory of 2704 2036 UF3Qe28.exe 30 PID 2036 wrote to memory of 2704 2036 UF3Qe28.exe 30 PID 2036 wrote to memory of 2704 2036 UF3Qe28.exe 30 PID 2704 wrote to memory of 2936 2704 GU6Bt51.exe 31 PID 2704 wrote to memory of 2936 2704 GU6Bt51.exe 31 PID 2704 wrote to memory of 2936 2704 GU6Bt51.exe 31 PID 2704 wrote to memory of 2936 2704 GU6Bt51.exe 31 PID 2704 wrote to memory of 2936 2704 GU6Bt51.exe 31 PID 2704 wrote to memory of 2936 2704 GU6Bt51.exe 31 PID 2704 wrote to memory of 2936 2704 GU6Bt51.exe 31 PID 2936 wrote to memory of 2812 2936 1GB51vx2.exe 33 PID 2936 wrote to memory of 2812 2936 1GB51vx2.exe 33 PID 2936 wrote to memory of 2812 2936 1GB51vx2.exe 33 PID 2936 wrote to memory of 2812 2936 1GB51vx2.exe 33 PID 2936 wrote to memory of 2812 2936 1GB51vx2.exe 33 PID 2936 wrote to memory of 2812 2936 1GB51vx2.exe 33 PID 2936 wrote to memory of 2812 2936 1GB51vx2.exe 33 PID 2936 wrote to memory of 2812 2936 1GB51vx2.exe 33 PID 2936 wrote to memory of 2812 2936 1GB51vx2.exe 33 PID 2936 wrote to memory of 2812 2936 1GB51vx2.exe 33 PID 2936 wrote to memory of 2812 2936 1GB51vx2.exe 33 PID 2936 wrote to memory of 2812 2936 1GB51vx2.exe 33 PID 2936 wrote to memory of 2672 2936 1GB51vx2.exe 34 PID 2936 wrote to memory of 2672 2936 1GB51vx2.exe 34 PID 2936 wrote to memory of 2672 2936 1GB51vx2.exe 34 PID 2936 wrote to memory of 2672 2936 1GB51vx2.exe 34 PID 2936 wrote to memory of 2672 2936 1GB51vx2.exe 34 PID 2936 wrote to memory of 2672 2936 1GB51vx2.exe 34 PID 2936 wrote to memory of 2672 2936 1GB51vx2.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\To5mI99.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\To5mI99.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\UF3Qe28.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\UF3Qe28.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\GU6Bt51.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\GU6Bt51.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1GB51vx2.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1GB51vx2.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:2672
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
904KB
MD5c403a7511befbc3766783cda396b4bdc
SHA1a7c669c907d6a216a0c4f406bb4040edfde030d5
SHA25641531a11b79438b80e2f0c44f1f05bd0055cb3fa5b78edc346f861ac5875ce77
SHA5129a0a4a6e27b06100ee88104381ce20aac7d8228ed63fe8f4d660f04683a8a497af1481be25111d5b1753ac37ee66dc66186e64503521d2ab49b1d0a0289ea741
-
Filesize
904KB
MD5c403a7511befbc3766783cda396b4bdc
SHA1a7c669c907d6a216a0c4f406bb4040edfde030d5
SHA25641531a11b79438b80e2f0c44f1f05bd0055cb3fa5b78edc346f861ac5875ce77
SHA5129a0a4a6e27b06100ee88104381ce20aac7d8228ed63fe8f4d660f04683a8a497af1481be25111d5b1753ac37ee66dc66186e64503521d2ab49b1d0a0289ea741
-
Filesize
615KB
MD564d6447cc1450c49c457d43cb3c32dad
SHA15cf5015ee3597f7ca6da54b8faad7bd72dd622fe
SHA256b9874ef4af3b186a86a9982363cf7721c3c36db9b68c3bf27d4e6a3538a2fa60
SHA5129e74329cc0672d70e6608adb3919f5fab77f61da94b620776d06adcd8354c6687b7764789ffea42e58ce6eb4d8007dedb319154a6d545466b695af7521a72aa5
-
Filesize
615KB
MD564d6447cc1450c49c457d43cb3c32dad
SHA15cf5015ee3597f7ca6da54b8faad7bd72dd622fe
SHA256b9874ef4af3b186a86a9982363cf7721c3c36db9b68c3bf27d4e6a3538a2fa60
SHA5129e74329cc0672d70e6608adb3919f5fab77f61da94b620776d06adcd8354c6687b7764789ffea42e58ce6eb4d8007dedb319154a6d545466b695af7521a72aa5
-
Filesize
378KB
MD5f112d6f0b3a328a830e79cb95acf88f7
SHA14820bcb5c7d28eea144ea0ae9618535d1f711d29
SHA256c160023188fb505993c0b4098db4ebcb95d15b6abfbbe72a6e653589463d9f71
SHA51220fdf108519b391add9f5b45967f57aacaeb054d06bfcb8ff2b66dd1bbec00a5da3519a0e51fe94d6bda51843a276d5e821af1e7f007392de5b140cb331524f2
-
Filesize
378KB
MD5f112d6f0b3a328a830e79cb95acf88f7
SHA14820bcb5c7d28eea144ea0ae9618535d1f711d29
SHA256c160023188fb505993c0b4098db4ebcb95d15b6abfbbe72a6e653589463d9f71
SHA51220fdf108519b391add9f5b45967f57aacaeb054d06bfcb8ff2b66dd1bbec00a5da3519a0e51fe94d6bda51843a276d5e821af1e7f007392de5b140cb331524f2
-
Filesize
237KB
MD55d5d9835f188fcb59555158860b424ad
SHA1a73397c1d2605e706c7421a0e806f2441ec07fa6
SHA256a99f8d86bf19f472de61efc0bb4922a18a1131eef35e4c6a0d922d82b182d4f8
SHA512aa308fd36fadf3f42b142589718693a2a3dcc0c329f382764137de1448ecf62bd296682b997517fe4e36960ae00873097c1a3e0bdcf41a30fff24bf57763504f
-
Filesize
237KB
MD55d5d9835f188fcb59555158860b424ad
SHA1a73397c1d2605e706c7421a0e806f2441ec07fa6
SHA256a99f8d86bf19f472de61efc0bb4922a18a1131eef35e4c6a0d922d82b182d4f8
SHA512aa308fd36fadf3f42b142589718693a2a3dcc0c329f382764137de1448ecf62bd296682b997517fe4e36960ae00873097c1a3e0bdcf41a30fff24bf57763504f
-
Filesize
904KB
MD5c403a7511befbc3766783cda396b4bdc
SHA1a7c669c907d6a216a0c4f406bb4040edfde030d5
SHA25641531a11b79438b80e2f0c44f1f05bd0055cb3fa5b78edc346f861ac5875ce77
SHA5129a0a4a6e27b06100ee88104381ce20aac7d8228ed63fe8f4d660f04683a8a497af1481be25111d5b1753ac37ee66dc66186e64503521d2ab49b1d0a0289ea741
-
Filesize
904KB
MD5c403a7511befbc3766783cda396b4bdc
SHA1a7c669c907d6a216a0c4f406bb4040edfde030d5
SHA25641531a11b79438b80e2f0c44f1f05bd0055cb3fa5b78edc346f861ac5875ce77
SHA5129a0a4a6e27b06100ee88104381ce20aac7d8228ed63fe8f4d660f04683a8a497af1481be25111d5b1753ac37ee66dc66186e64503521d2ab49b1d0a0289ea741
-
Filesize
615KB
MD564d6447cc1450c49c457d43cb3c32dad
SHA15cf5015ee3597f7ca6da54b8faad7bd72dd622fe
SHA256b9874ef4af3b186a86a9982363cf7721c3c36db9b68c3bf27d4e6a3538a2fa60
SHA5129e74329cc0672d70e6608adb3919f5fab77f61da94b620776d06adcd8354c6687b7764789ffea42e58ce6eb4d8007dedb319154a6d545466b695af7521a72aa5
-
Filesize
615KB
MD564d6447cc1450c49c457d43cb3c32dad
SHA15cf5015ee3597f7ca6da54b8faad7bd72dd622fe
SHA256b9874ef4af3b186a86a9982363cf7721c3c36db9b68c3bf27d4e6a3538a2fa60
SHA5129e74329cc0672d70e6608adb3919f5fab77f61da94b620776d06adcd8354c6687b7764789ffea42e58ce6eb4d8007dedb319154a6d545466b695af7521a72aa5
-
Filesize
378KB
MD5f112d6f0b3a328a830e79cb95acf88f7
SHA14820bcb5c7d28eea144ea0ae9618535d1f711d29
SHA256c160023188fb505993c0b4098db4ebcb95d15b6abfbbe72a6e653589463d9f71
SHA51220fdf108519b391add9f5b45967f57aacaeb054d06bfcb8ff2b66dd1bbec00a5da3519a0e51fe94d6bda51843a276d5e821af1e7f007392de5b140cb331524f2
-
Filesize
378KB
MD5f112d6f0b3a328a830e79cb95acf88f7
SHA14820bcb5c7d28eea144ea0ae9618535d1f711d29
SHA256c160023188fb505993c0b4098db4ebcb95d15b6abfbbe72a6e653589463d9f71
SHA51220fdf108519b391add9f5b45967f57aacaeb054d06bfcb8ff2b66dd1bbec00a5da3519a0e51fe94d6bda51843a276d5e821af1e7f007392de5b140cb331524f2
-
Filesize
237KB
MD55d5d9835f188fcb59555158860b424ad
SHA1a73397c1d2605e706c7421a0e806f2441ec07fa6
SHA256a99f8d86bf19f472de61efc0bb4922a18a1131eef35e4c6a0d922d82b182d4f8
SHA512aa308fd36fadf3f42b142589718693a2a3dcc0c329f382764137de1448ecf62bd296682b997517fe4e36960ae00873097c1a3e0bdcf41a30fff24bf57763504f
-
Filesize
237KB
MD55d5d9835f188fcb59555158860b424ad
SHA1a73397c1d2605e706c7421a0e806f2441ec07fa6
SHA256a99f8d86bf19f472de61efc0bb4922a18a1131eef35e4c6a0d922d82b182d4f8
SHA512aa308fd36fadf3f42b142589718693a2a3dcc0c329f382764137de1448ecf62bd296682b997517fe4e36960ae00873097c1a3e0bdcf41a30fff24bf57763504f
-
Filesize
237KB
MD55d5d9835f188fcb59555158860b424ad
SHA1a73397c1d2605e706c7421a0e806f2441ec07fa6
SHA256a99f8d86bf19f472de61efc0bb4922a18a1131eef35e4c6a0d922d82b182d4f8
SHA512aa308fd36fadf3f42b142589718693a2a3dcc0c329f382764137de1448ecf62bd296682b997517fe4e36960ae00873097c1a3e0bdcf41a30fff24bf57763504f
-
Filesize
237KB
MD55d5d9835f188fcb59555158860b424ad
SHA1a73397c1d2605e706c7421a0e806f2441ec07fa6
SHA256a99f8d86bf19f472de61efc0bb4922a18a1131eef35e4c6a0d922d82b182d4f8
SHA512aa308fd36fadf3f42b142589718693a2a3dcc0c329f382764137de1448ecf62bd296682b997517fe4e36960ae00873097c1a3e0bdcf41a30fff24bf57763504f
-
Filesize
237KB
MD55d5d9835f188fcb59555158860b424ad
SHA1a73397c1d2605e706c7421a0e806f2441ec07fa6
SHA256a99f8d86bf19f472de61efc0bb4922a18a1131eef35e4c6a0d922d82b182d4f8
SHA512aa308fd36fadf3f42b142589718693a2a3dcc0c329f382764137de1448ecf62bd296682b997517fe4e36960ae00873097c1a3e0bdcf41a30fff24bf57763504f
-
Filesize
237KB
MD55d5d9835f188fcb59555158860b424ad
SHA1a73397c1d2605e706c7421a0e806f2441ec07fa6
SHA256a99f8d86bf19f472de61efc0bb4922a18a1131eef35e4c6a0d922d82b182d4f8
SHA512aa308fd36fadf3f42b142589718693a2a3dcc0c329f382764137de1448ecf62bd296682b997517fe4e36960ae00873097c1a3e0bdcf41a30fff24bf57763504f