Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 08:56
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
1.0MB
-
MD5
8f949da09d86d1441d30568e049422c4
-
SHA1
0aa0823c606649aa3694c50a831f191227a8c88c
-
SHA256
dad8c08535425b16d5d4ad67145f09170cfb08f5b8fefff4a4769c529c33d4bd
-
SHA512
dc59b718017c5af40ea17a5cfeb20ec8f036802fd60d4a4af376ced376936b9545a2b7bd2f17fac763313bd449d8c6e900d7e0595d8776f1d89ddf1189100328
-
SSDEEP
24576:kyv1jgYmN/BWg0Ana/UFb0/ZrPA5ZOl3OA64Gym5hRCeQ+5J5:z90hgpAn7FbEJA5MlAyihseQw
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 2244 aR9nb47.exe 1328 cj4xJ30.exe 2352 AJ0cX62.exe 2760 1TT04Nw2.exe -
Loads dropped DLL 12 IoCs
pid Process 1032 file.exe 2244 aR9nb47.exe 2244 aR9nb47.exe 1328 cj4xJ30.exe 1328 cj4xJ30.exe 2352 AJ0cX62.exe 2352 AJ0cX62.exe 2760 1TT04Nw2.exe 2644 WerFault.exe 2644 WerFault.exe 2644 WerFault.exe 2644 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" aR9nb47.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" cj4xJ30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" AJ0cX62.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2760 set thread context of 1988 2760 1TT04Nw2.exe 33 -
Program crash 1 IoCs
pid pid_target Process procid_target 2644 2760 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1988 AppLaunch.exe 1988 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1988 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1032 wrote to memory of 2244 1032 file.exe 28 PID 1032 wrote to memory of 2244 1032 file.exe 28 PID 1032 wrote to memory of 2244 1032 file.exe 28 PID 1032 wrote to memory of 2244 1032 file.exe 28 PID 1032 wrote to memory of 2244 1032 file.exe 28 PID 1032 wrote to memory of 2244 1032 file.exe 28 PID 1032 wrote to memory of 2244 1032 file.exe 28 PID 2244 wrote to memory of 1328 2244 aR9nb47.exe 29 PID 2244 wrote to memory of 1328 2244 aR9nb47.exe 29 PID 2244 wrote to memory of 1328 2244 aR9nb47.exe 29 PID 2244 wrote to memory of 1328 2244 aR9nb47.exe 29 PID 2244 wrote to memory of 1328 2244 aR9nb47.exe 29 PID 2244 wrote to memory of 1328 2244 aR9nb47.exe 29 PID 2244 wrote to memory of 1328 2244 aR9nb47.exe 29 PID 1328 wrote to memory of 2352 1328 cj4xJ30.exe 30 PID 1328 wrote to memory of 2352 1328 cj4xJ30.exe 30 PID 1328 wrote to memory of 2352 1328 cj4xJ30.exe 30 PID 1328 wrote to memory of 2352 1328 cj4xJ30.exe 30 PID 1328 wrote to memory of 2352 1328 cj4xJ30.exe 30 PID 1328 wrote to memory of 2352 1328 cj4xJ30.exe 30 PID 1328 wrote to memory of 2352 1328 cj4xJ30.exe 30 PID 2352 wrote to memory of 2760 2352 AJ0cX62.exe 31 PID 2352 wrote to memory of 2760 2352 AJ0cX62.exe 31 PID 2352 wrote to memory of 2760 2352 AJ0cX62.exe 31 PID 2352 wrote to memory of 2760 2352 AJ0cX62.exe 31 PID 2352 wrote to memory of 2760 2352 AJ0cX62.exe 31 PID 2352 wrote to memory of 2760 2352 AJ0cX62.exe 31 PID 2352 wrote to memory of 2760 2352 AJ0cX62.exe 31 PID 2760 wrote to memory of 1988 2760 1TT04Nw2.exe 33 PID 2760 wrote to memory of 1988 2760 1TT04Nw2.exe 33 PID 2760 wrote to memory of 1988 2760 1TT04Nw2.exe 33 PID 2760 wrote to memory of 1988 2760 1TT04Nw2.exe 33 PID 2760 wrote to memory of 1988 2760 1TT04Nw2.exe 33 PID 2760 wrote to memory of 1988 2760 1TT04Nw2.exe 33 PID 2760 wrote to memory of 1988 2760 1TT04Nw2.exe 33 PID 2760 wrote to memory of 1988 2760 1TT04Nw2.exe 33 PID 2760 wrote to memory of 1988 2760 1TT04Nw2.exe 33 PID 2760 wrote to memory of 1988 2760 1TT04Nw2.exe 33 PID 2760 wrote to memory of 1988 2760 1TT04Nw2.exe 33 PID 2760 wrote to memory of 1988 2760 1TT04Nw2.exe 33 PID 2760 wrote to memory of 2644 2760 1TT04Nw2.exe 34 PID 2760 wrote to memory of 2644 2760 1TT04Nw2.exe 34 PID 2760 wrote to memory of 2644 2760 1TT04Nw2.exe 34 PID 2760 wrote to memory of 2644 2760 1TT04Nw2.exe 34 PID 2760 wrote to memory of 2644 2760 1TT04Nw2.exe 34 PID 2760 wrote to memory of 2644 2760 1TT04Nw2.exe 34 PID 2760 wrote to memory of 2644 2760 1TT04Nw2.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\aR9nb47.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\aR9nb47.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cj4xJ30.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cj4xJ30.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\AJ0cX62.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\AJ0cX62.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1TT04Nw2.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1TT04Nw2.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:2644
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
903KB
MD5486bdc262cb6f853ff99691f0b1cd897
SHA11d1508cd1106cb1b9c10c70ed60df42b2a828e0f
SHA25653bb2f54681ce30b4de3cd88463d0fcc34b20f71626c0321c373ab6742a4aa7a
SHA512435f64f9afd1dc750c97533f92d942d3efce2782c341b887e7f7f4d79e672a5219500df77d200f92985f0dd3914d01c618ee74020ede4878a5d5cf66dbc351a9
-
Filesize
903KB
MD5486bdc262cb6f853ff99691f0b1cd897
SHA11d1508cd1106cb1b9c10c70ed60df42b2a828e0f
SHA25653bb2f54681ce30b4de3cd88463d0fcc34b20f71626c0321c373ab6742a4aa7a
SHA512435f64f9afd1dc750c97533f92d942d3efce2782c341b887e7f7f4d79e672a5219500df77d200f92985f0dd3914d01c618ee74020ede4878a5d5cf66dbc351a9
-
Filesize
615KB
MD50318e58fc9b214f5f9bbb211d38b1bd3
SHA14ceb526353163a01e785b80cd5cd4b244b2d9781
SHA256fbc5b125d512dc00a6316fd1510cb00707c5e6c79ef03ba29d3bc771c3c8474b
SHA5125dbaaaec5d801f6fe8ba2886f8396a00717ae0b200a7c07c3c71bfbb1064581fdfb967db619756a04a8c19fa6726d38eaa1daf94315bfa636264671efb3768aa
-
Filesize
615KB
MD50318e58fc9b214f5f9bbb211d38b1bd3
SHA14ceb526353163a01e785b80cd5cd4b244b2d9781
SHA256fbc5b125d512dc00a6316fd1510cb00707c5e6c79ef03ba29d3bc771c3c8474b
SHA5125dbaaaec5d801f6fe8ba2886f8396a00717ae0b200a7c07c3c71bfbb1064581fdfb967db619756a04a8c19fa6726d38eaa1daf94315bfa636264671efb3768aa
-
Filesize
376KB
MD59e0b0708312ddcee1df1a87217f3d966
SHA123e5a5eb63d4f63467ede3f33dbb400ce8e0e35d
SHA25643e0bf73996641f7d5ddafcd4b55b741292ad7409aaca0390be5715f00422afb
SHA5120b4b6bcbb1c8622c2d31998364fed69f4d85466be50080554cbc31c027ff2770a3ebc4f59183594bfd0c74d283d3f0c21e83647eb33061b3232d4ad4ce785f12
-
Filesize
376KB
MD59e0b0708312ddcee1df1a87217f3d966
SHA123e5a5eb63d4f63467ede3f33dbb400ce8e0e35d
SHA25643e0bf73996641f7d5ddafcd4b55b741292ad7409aaca0390be5715f00422afb
SHA5120b4b6bcbb1c8622c2d31998364fed69f4d85466be50080554cbc31c027ff2770a3ebc4f59183594bfd0c74d283d3f0c21e83647eb33061b3232d4ad4ce785f12
-
Filesize
237KB
MD52793c497ba2bf14fc4f023d1aea41ed7
SHA11f37d75f19b3041e1b1820ac0be3b96bede4272a
SHA256c17808eb3cb06e80cac57656cb41a1f968e99033b68fa4343bb4095a023d688e
SHA5127480991356955495815afa2b1a999797b73c19e2c8d8e3b86d194569dc9a637fae992d7a7c524aac6917267953b5b6a0c89a7ad1f311efd4d10a4940934ef395
-
Filesize
237KB
MD52793c497ba2bf14fc4f023d1aea41ed7
SHA11f37d75f19b3041e1b1820ac0be3b96bede4272a
SHA256c17808eb3cb06e80cac57656cb41a1f968e99033b68fa4343bb4095a023d688e
SHA5127480991356955495815afa2b1a999797b73c19e2c8d8e3b86d194569dc9a637fae992d7a7c524aac6917267953b5b6a0c89a7ad1f311efd4d10a4940934ef395
-
Filesize
903KB
MD5486bdc262cb6f853ff99691f0b1cd897
SHA11d1508cd1106cb1b9c10c70ed60df42b2a828e0f
SHA25653bb2f54681ce30b4de3cd88463d0fcc34b20f71626c0321c373ab6742a4aa7a
SHA512435f64f9afd1dc750c97533f92d942d3efce2782c341b887e7f7f4d79e672a5219500df77d200f92985f0dd3914d01c618ee74020ede4878a5d5cf66dbc351a9
-
Filesize
903KB
MD5486bdc262cb6f853ff99691f0b1cd897
SHA11d1508cd1106cb1b9c10c70ed60df42b2a828e0f
SHA25653bb2f54681ce30b4de3cd88463d0fcc34b20f71626c0321c373ab6742a4aa7a
SHA512435f64f9afd1dc750c97533f92d942d3efce2782c341b887e7f7f4d79e672a5219500df77d200f92985f0dd3914d01c618ee74020ede4878a5d5cf66dbc351a9
-
Filesize
615KB
MD50318e58fc9b214f5f9bbb211d38b1bd3
SHA14ceb526353163a01e785b80cd5cd4b244b2d9781
SHA256fbc5b125d512dc00a6316fd1510cb00707c5e6c79ef03ba29d3bc771c3c8474b
SHA5125dbaaaec5d801f6fe8ba2886f8396a00717ae0b200a7c07c3c71bfbb1064581fdfb967db619756a04a8c19fa6726d38eaa1daf94315bfa636264671efb3768aa
-
Filesize
615KB
MD50318e58fc9b214f5f9bbb211d38b1bd3
SHA14ceb526353163a01e785b80cd5cd4b244b2d9781
SHA256fbc5b125d512dc00a6316fd1510cb00707c5e6c79ef03ba29d3bc771c3c8474b
SHA5125dbaaaec5d801f6fe8ba2886f8396a00717ae0b200a7c07c3c71bfbb1064581fdfb967db619756a04a8c19fa6726d38eaa1daf94315bfa636264671efb3768aa
-
Filesize
376KB
MD59e0b0708312ddcee1df1a87217f3d966
SHA123e5a5eb63d4f63467ede3f33dbb400ce8e0e35d
SHA25643e0bf73996641f7d5ddafcd4b55b741292ad7409aaca0390be5715f00422afb
SHA5120b4b6bcbb1c8622c2d31998364fed69f4d85466be50080554cbc31c027ff2770a3ebc4f59183594bfd0c74d283d3f0c21e83647eb33061b3232d4ad4ce785f12
-
Filesize
376KB
MD59e0b0708312ddcee1df1a87217f3d966
SHA123e5a5eb63d4f63467ede3f33dbb400ce8e0e35d
SHA25643e0bf73996641f7d5ddafcd4b55b741292ad7409aaca0390be5715f00422afb
SHA5120b4b6bcbb1c8622c2d31998364fed69f4d85466be50080554cbc31c027ff2770a3ebc4f59183594bfd0c74d283d3f0c21e83647eb33061b3232d4ad4ce785f12
-
Filesize
237KB
MD52793c497ba2bf14fc4f023d1aea41ed7
SHA11f37d75f19b3041e1b1820ac0be3b96bede4272a
SHA256c17808eb3cb06e80cac57656cb41a1f968e99033b68fa4343bb4095a023d688e
SHA5127480991356955495815afa2b1a999797b73c19e2c8d8e3b86d194569dc9a637fae992d7a7c524aac6917267953b5b6a0c89a7ad1f311efd4d10a4940934ef395
-
Filesize
237KB
MD52793c497ba2bf14fc4f023d1aea41ed7
SHA11f37d75f19b3041e1b1820ac0be3b96bede4272a
SHA256c17808eb3cb06e80cac57656cb41a1f968e99033b68fa4343bb4095a023d688e
SHA5127480991356955495815afa2b1a999797b73c19e2c8d8e3b86d194569dc9a637fae992d7a7c524aac6917267953b5b6a0c89a7ad1f311efd4d10a4940934ef395
-
Filesize
237KB
MD52793c497ba2bf14fc4f023d1aea41ed7
SHA11f37d75f19b3041e1b1820ac0be3b96bede4272a
SHA256c17808eb3cb06e80cac57656cb41a1f968e99033b68fa4343bb4095a023d688e
SHA5127480991356955495815afa2b1a999797b73c19e2c8d8e3b86d194569dc9a637fae992d7a7c524aac6917267953b5b6a0c89a7ad1f311efd4d10a4940934ef395
-
Filesize
237KB
MD52793c497ba2bf14fc4f023d1aea41ed7
SHA11f37d75f19b3041e1b1820ac0be3b96bede4272a
SHA256c17808eb3cb06e80cac57656cb41a1f968e99033b68fa4343bb4095a023d688e
SHA5127480991356955495815afa2b1a999797b73c19e2c8d8e3b86d194569dc9a637fae992d7a7c524aac6917267953b5b6a0c89a7ad1f311efd4d10a4940934ef395
-
Filesize
237KB
MD52793c497ba2bf14fc4f023d1aea41ed7
SHA11f37d75f19b3041e1b1820ac0be3b96bede4272a
SHA256c17808eb3cb06e80cac57656cb41a1f968e99033b68fa4343bb4095a023d688e
SHA5127480991356955495815afa2b1a999797b73c19e2c8d8e3b86d194569dc9a637fae992d7a7c524aac6917267953b5b6a0c89a7ad1f311efd4d10a4940934ef395
-
Filesize
237KB
MD52793c497ba2bf14fc4f023d1aea41ed7
SHA11f37d75f19b3041e1b1820ac0be3b96bede4272a
SHA256c17808eb3cb06e80cac57656cb41a1f968e99033b68fa4343bb4095a023d688e
SHA5127480991356955495815afa2b1a999797b73c19e2c8d8e3b86d194569dc9a637fae992d7a7c524aac6917267953b5b6a0c89a7ad1f311efd4d10a4940934ef395