Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
1.4MB
-
MD5
4e96f721b1b5024763934e6d6da77fa7
-
SHA1
4f1cf78a030a2ea440de26a05c736181f1408b54
-
SHA256
fa81a480c9964f3720433a4d2d00962d5ea1c7dd5fc7bc2b0fd864a57691ba79
-
SHA512
c8401aeb5d311a007058de1a9eae0e5006b8968080705802bad11e3c9f12fc08abbd0acce9fe071fc14378b7e4bfb5fff2c813dad80b3dd6e8f45942710e913c
-
SSDEEP
24576:rya/moYJnXAiT3dg777Pr5icB88f/Aw/8F6xHPiARLpiAQsGdqaB0M0jytITkzO:eaOojiTNkPdJB88f/393pV2q9May7z
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 2456 Qw2FV48.exe 2808 tD0JU55.exe 2352 Vg5Sg99.exe 2816 1sv99fl3.exe -
Loads dropped DLL 12 IoCs
pid Process 1212 file.exe 2456 Qw2FV48.exe 2456 Qw2FV48.exe 2808 tD0JU55.exe 2808 tD0JU55.exe 2352 Vg5Sg99.exe 2352 Vg5Sg99.exe 2816 1sv99fl3.exe 2516 WerFault.exe 2516 WerFault.exe 2516 WerFault.exe 2516 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Qw2FV48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tD0JU55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Vg5Sg99.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2816 set thread context of 2616 2816 1sv99fl3.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 2516 2816 WerFault.exe 30 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2616 AppLaunch.exe 2616 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2616 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1212 wrote to memory of 2456 1212 file.exe 27 PID 1212 wrote to memory of 2456 1212 file.exe 27 PID 1212 wrote to memory of 2456 1212 file.exe 27 PID 1212 wrote to memory of 2456 1212 file.exe 27 PID 1212 wrote to memory of 2456 1212 file.exe 27 PID 1212 wrote to memory of 2456 1212 file.exe 27 PID 1212 wrote to memory of 2456 1212 file.exe 27 PID 2456 wrote to memory of 2808 2456 Qw2FV48.exe 28 PID 2456 wrote to memory of 2808 2456 Qw2FV48.exe 28 PID 2456 wrote to memory of 2808 2456 Qw2FV48.exe 28 PID 2456 wrote to memory of 2808 2456 Qw2FV48.exe 28 PID 2456 wrote to memory of 2808 2456 Qw2FV48.exe 28 PID 2456 wrote to memory of 2808 2456 Qw2FV48.exe 28 PID 2456 wrote to memory of 2808 2456 Qw2FV48.exe 28 PID 2808 wrote to memory of 2352 2808 tD0JU55.exe 29 PID 2808 wrote to memory of 2352 2808 tD0JU55.exe 29 PID 2808 wrote to memory of 2352 2808 tD0JU55.exe 29 PID 2808 wrote to memory of 2352 2808 tD0JU55.exe 29 PID 2808 wrote to memory of 2352 2808 tD0JU55.exe 29 PID 2808 wrote to memory of 2352 2808 tD0JU55.exe 29 PID 2808 wrote to memory of 2352 2808 tD0JU55.exe 29 PID 2352 wrote to memory of 2816 2352 Vg5Sg99.exe 30 PID 2352 wrote to memory of 2816 2352 Vg5Sg99.exe 30 PID 2352 wrote to memory of 2816 2352 Vg5Sg99.exe 30 PID 2352 wrote to memory of 2816 2352 Vg5Sg99.exe 30 PID 2352 wrote to memory of 2816 2352 Vg5Sg99.exe 30 PID 2352 wrote to memory of 2816 2352 Vg5Sg99.exe 30 PID 2352 wrote to memory of 2816 2352 Vg5Sg99.exe 30 PID 2816 wrote to memory of 2616 2816 1sv99fl3.exe 31 PID 2816 wrote to memory of 2616 2816 1sv99fl3.exe 31 PID 2816 wrote to memory of 2616 2816 1sv99fl3.exe 31 PID 2816 wrote to memory of 2616 2816 1sv99fl3.exe 31 PID 2816 wrote to memory of 2616 2816 1sv99fl3.exe 31 PID 2816 wrote to memory of 2616 2816 1sv99fl3.exe 31 PID 2816 wrote to memory of 2616 2816 1sv99fl3.exe 31 PID 2816 wrote to memory of 2616 2816 1sv99fl3.exe 31 PID 2816 wrote to memory of 2616 2816 1sv99fl3.exe 31 PID 2816 wrote to memory of 2616 2816 1sv99fl3.exe 31 PID 2816 wrote to memory of 2616 2816 1sv99fl3.exe 31 PID 2816 wrote to memory of 2616 2816 1sv99fl3.exe 31 PID 2816 wrote to memory of 2516 2816 1sv99fl3.exe 32 PID 2816 wrote to memory of 2516 2816 1sv99fl3.exe 32 PID 2816 wrote to memory of 2516 2816 1sv99fl3.exe 32 PID 2816 wrote to memory of 2516 2816 1sv99fl3.exe 32 PID 2816 wrote to memory of 2516 2816 1sv99fl3.exe 32 PID 2816 wrote to memory of 2516 2816 1sv99fl3.exe 32 PID 2816 wrote to memory of 2516 2816 1sv99fl3.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qw2FV48.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qw2FV48.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tD0JU55.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tD0JU55.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Vg5Sg99.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Vg5Sg99.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1sv99fl3.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1sv99fl3.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2516
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5e7f305ae5e0e0639f4fcdb901a6dd3a2
SHA10bc60bdb1820112d2ae6aa56896064de4f01ebd0
SHA25691643aec773652d958c187dc8b1c9a2d6a7aa1531ccd41eee9f5fdafe8c8c095
SHA512cc9fddd126cee5da1dd32bb7903dabc1122df4dca4fcadaf66eadf1a2b266975370985120423764cddf05f4867de4b236d0ba315a9b813fc86a7b39c369b66fc
-
Filesize
1.3MB
MD5e7f305ae5e0e0639f4fcdb901a6dd3a2
SHA10bc60bdb1820112d2ae6aa56896064de4f01ebd0
SHA25691643aec773652d958c187dc8b1c9a2d6a7aa1531ccd41eee9f5fdafe8c8c095
SHA512cc9fddd126cee5da1dd32bb7903dabc1122df4dca4fcadaf66eadf1a2b266975370985120423764cddf05f4867de4b236d0ba315a9b813fc86a7b39c369b66fc
-
Filesize
895KB
MD5b25d1c162f79b92a22b352b7303e623c
SHA1ffffb30697102c106fe3fbaa1479ade935b0c681
SHA256c07b8719e1e5af72b82771cc1ee8aace72d110f7972015b6ba0622996b9d661d
SHA5126949b9a3775a74773f8e8283e4d6beff8a93d18d91941b12fd09dd18e4d5328f2d2e48a2208ccdda69322d9ede9d9d5214f07edefd39ce249fd7b1410b04195b
-
Filesize
895KB
MD5b25d1c162f79b92a22b352b7303e623c
SHA1ffffb30697102c106fe3fbaa1479ade935b0c681
SHA256c07b8719e1e5af72b82771cc1ee8aace72d110f7972015b6ba0622996b9d661d
SHA5126949b9a3775a74773f8e8283e4d6beff8a93d18d91941b12fd09dd18e4d5328f2d2e48a2208ccdda69322d9ede9d9d5214f07edefd39ce249fd7b1410b04195b
-
Filesize
533KB
MD59af637f23daa529e8af35c8580170e71
SHA167daa52d2b77d19fbe769e7d541cccc45d5d4a60
SHA256b4dc901aeacb690b45973420f74e7bb1d6481b3a3b98fb06d84aa85b580eb476
SHA5124d3f039eedb1ac1abf61a16a860169c3565c57b05a6357b7432475cdf13ee14b47787249ca65d3b468f34a68d2b8243cc5353398686024cb002aa01c057e0d69
-
Filesize
533KB
MD59af637f23daa529e8af35c8580170e71
SHA167daa52d2b77d19fbe769e7d541cccc45d5d4a60
SHA256b4dc901aeacb690b45973420f74e7bb1d6481b3a3b98fb06d84aa85b580eb476
SHA5124d3f039eedb1ac1abf61a16a860169c3565c57b05a6357b7432475cdf13ee14b47787249ca65d3b468f34a68d2b8243cc5353398686024cb002aa01c057e0d69
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
1.3MB
MD5e7f305ae5e0e0639f4fcdb901a6dd3a2
SHA10bc60bdb1820112d2ae6aa56896064de4f01ebd0
SHA25691643aec773652d958c187dc8b1c9a2d6a7aa1531ccd41eee9f5fdafe8c8c095
SHA512cc9fddd126cee5da1dd32bb7903dabc1122df4dca4fcadaf66eadf1a2b266975370985120423764cddf05f4867de4b236d0ba315a9b813fc86a7b39c369b66fc
-
Filesize
1.3MB
MD5e7f305ae5e0e0639f4fcdb901a6dd3a2
SHA10bc60bdb1820112d2ae6aa56896064de4f01ebd0
SHA25691643aec773652d958c187dc8b1c9a2d6a7aa1531ccd41eee9f5fdafe8c8c095
SHA512cc9fddd126cee5da1dd32bb7903dabc1122df4dca4fcadaf66eadf1a2b266975370985120423764cddf05f4867de4b236d0ba315a9b813fc86a7b39c369b66fc
-
Filesize
895KB
MD5b25d1c162f79b92a22b352b7303e623c
SHA1ffffb30697102c106fe3fbaa1479ade935b0c681
SHA256c07b8719e1e5af72b82771cc1ee8aace72d110f7972015b6ba0622996b9d661d
SHA5126949b9a3775a74773f8e8283e4d6beff8a93d18d91941b12fd09dd18e4d5328f2d2e48a2208ccdda69322d9ede9d9d5214f07edefd39ce249fd7b1410b04195b
-
Filesize
895KB
MD5b25d1c162f79b92a22b352b7303e623c
SHA1ffffb30697102c106fe3fbaa1479ade935b0c681
SHA256c07b8719e1e5af72b82771cc1ee8aace72d110f7972015b6ba0622996b9d661d
SHA5126949b9a3775a74773f8e8283e4d6beff8a93d18d91941b12fd09dd18e4d5328f2d2e48a2208ccdda69322d9ede9d9d5214f07edefd39ce249fd7b1410b04195b
-
Filesize
533KB
MD59af637f23daa529e8af35c8580170e71
SHA167daa52d2b77d19fbe769e7d541cccc45d5d4a60
SHA256b4dc901aeacb690b45973420f74e7bb1d6481b3a3b98fb06d84aa85b580eb476
SHA5124d3f039eedb1ac1abf61a16a860169c3565c57b05a6357b7432475cdf13ee14b47787249ca65d3b468f34a68d2b8243cc5353398686024cb002aa01c057e0d69
-
Filesize
533KB
MD59af637f23daa529e8af35c8580170e71
SHA167daa52d2b77d19fbe769e7d541cccc45d5d4a60
SHA256b4dc901aeacb690b45973420f74e7bb1d6481b3a3b98fb06d84aa85b580eb476
SHA5124d3f039eedb1ac1abf61a16a860169c3565c57b05a6357b7432475cdf13ee14b47787249ca65d3b468f34a68d2b8243cc5353398686024cb002aa01c057e0d69
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81