Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
1.5MB
-
MD5
4d7c4174431a679c9daf784254504411
-
SHA1
e883b743fa535eedb846d0d97253624537087656
-
SHA256
9e8dde73ccc01bb2ebd1be592d98fc8a7c213f0247f1cfaea2131ab755069a58
-
SHA512
4eb24519ea22e272222b3b6912ebc4b2080f0091dddd7b64c2ebf2aa8a521ae14577744a0d6a2725fdf4972082cb8c10444094200b1ea389d2d1fbcff05b5dc6
-
SSDEEP
24576:syxFv7gSL/xJ6eqE7E/piYEA58MBFxZ4v+uQ7NtAOGbcyKzP3jNpAnE4QWbQGeUl:bzEoxJ6eZExKK+v+uIt8NKzPZX4nQ2
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 1712 Uu9oD32.exe 2644 lb8AA14.exe 2984 wH0Yj84.exe 2768 1gY42PL0.exe -
Loads dropped DLL 12 IoCs
pid Process 2408 file.exe 1712 Uu9oD32.exe 1712 Uu9oD32.exe 2644 lb8AA14.exe 2644 lb8AA14.exe 2984 wH0Yj84.exe 2984 wH0Yj84.exe 2768 1gY42PL0.exe 2524 WerFault.exe 2524 WerFault.exe 2524 WerFault.exe 2524 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Uu9oD32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" lb8AA14.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" wH0Yj84.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2768 set thread context of 2760 2768 1gY42PL0.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2524 2768 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2760 AppLaunch.exe 2760 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2760 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1712 2408 file.exe 28 PID 2408 wrote to memory of 1712 2408 file.exe 28 PID 2408 wrote to memory of 1712 2408 file.exe 28 PID 2408 wrote to memory of 1712 2408 file.exe 28 PID 2408 wrote to memory of 1712 2408 file.exe 28 PID 2408 wrote to memory of 1712 2408 file.exe 28 PID 2408 wrote to memory of 1712 2408 file.exe 28 PID 1712 wrote to memory of 2644 1712 Uu9oD32.exe 29 PID 1712 wrote to memory of 2644 1712 Uu9oD32.exe 29 PID 1712 wrote to memory of 2644 1712 Uu9oD32.exe 29 PID 1712 wrote to memory of 2644 1712 Uu9oD32.exe 29 PID 1712 wrote to memory of 2644 1712 Uu9oD32.exe 29 PID 1712 wrote to memory of 2644 1712 Uu9oD32.exe 29 PID 1712 wrote to memory of 2644 1712 Uu9oD32.exe 29 PID 2644 wrote to memory of 2984 2644 lb8AA14.exe 30 PID 2644 wrote to memory of 2984 2644 lb8AA14.exe 30 PID 2644 wrote to memory of 2984 2644 lb8AA14.exe 30 PID 2644 wrote to memory of 2984 2644 lb8AA14.exe 30 PID 2644 wrote to memory of 2984 2644 lb8AA14.exe 30 PID 2644 wrote to memory of 2984 2644 lb8AA14.exe 30 PID 2644 wrote to memory of 2984 2644 lb8AA14.exe 30 PID 2984 wrote to memory of 2768 2984 wH0Yj84.exe 31 PID 2984 wrote to memory of 2768 2984 wH0Yj84.exe 31 PID 2984 wrote to memory of 2768 2984 wH0Yj84.exe 31 PID 2984 wrote to memory of 2768 2984 wH0Yj84.exe 31 PID 2984 wrote to memory of 2768 2984 wH0Yj84.exe 31 PID 2984 wrote to memory of 2768 2984 wH0Yj84.exe 31 PID 2984 wrote to memory of 2768 2984 wH0Yj84.exe 31 PID 2768 wrote to memory of 2760 2768 1gY42PL0.exe 32 PID 2768 wrote to memory of 2760 2768 1gY42PL0.exe 32 PID 2768 wrote to memory of 2760 2768 1gY42PL0.exe 32 PID 2768 wrote to memory of 2760 2768 1gY42PL0.exe 32 PID 2768 wrote to memory of 2760 2768 1gY42PL0.exe 32 PID 2768 wrote to memory of 2760 2768 1gY42PL0.exe 32 PID 2768 wrote to memory of 2760 2768 1gY42PL0.exe 32 PID 2768 wrote to memory of 2760 2768 1gY42PL0.exe 32 PID 2768 wrote to memory of 2760 2768 1gY42PL0.exe 32 PID 2768 wrote to memory of 2760 2768 1gY42PL0.exe 32 PID 2768 wrote to memory of 2760 2768 1gY42PL0.exe 32 PID 2768 wrote to memory of 2760 2768 1gY42PL0.exe 32 PID 2768 wrote to memory of 2524 2768 1gY42PL0.exe 33 PID 2768 wrote to memory of 2524 2768 1gY42PL0.exe 33 PID 2768 wrote to memory of 2524 2768 1gY42PL0.exe 33 PID 2768 wrote to memory of 2524 2768 1gY42PL0.exe 33 PID 2768 wrote to memory of 2524 2768 1gY42PL0.exe 33 PID 2768 wrote to memory of 2524 2768 1gY42PL0.exe 33 PID 2768 wrote to memory of 2524 2768 1gY42PL0.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Uu9oD32.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Uu9oD32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\lb8AA14.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\lb8AA14.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\wH0Yj84.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\wH0Yj84.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1gY42PL0.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1gY42PL0.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2524
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5cbb56f5194ed7600ee65dd46e45208ff
SHA11acb8e322d047207bc098b84e3400699400bd9d2
SHA256ee70b9f0007555cf2dc823e4d1ea7c8e5d911d295947dc2b0c2146c321bedcf6
SHA51283e6fc646da64d536f9cf2802ec4a06042cd8b8a54fe74be4042fe1764038af8b323d51f933cdb5ae39029b2cf361419aefd7a3973cc807c9cf28b9943259829
-
Filesize
1.3MB
MD5cbb56f5194ed7600ee65dd46e45208ff
SHA11acb8e322d047207bc098b84e3400699400bd9d2
SHA256ee70b9f0007555cf2dc823e4d1ea7c8e5d911d295947dc2b0c2146c321bedcf6
SHA51283e6fc646da64d536f9cf2802ec4a06042cd8b8a54fe74be4042fe1764038af8b323d51f933cdb5ae39029b2cf361419aefd7a3973cc807c9cf28b9943259829
-
Filesize
931KB
MD5d154139321e4ffff9417ef51b1ff5562
SHA1e702fefd552be90dcffa390dc21380d927a21014
SHA25620d461c1d66702d07c2c46ace37720359c15e54629ef2b08c226069cbcfbe78b
SHA5125dc9bada4d33f66a5771a50a9dc390500cd0d845920dd5f7d427ce0b59d265e7f4babf22587716f2124dada27b74dcca0d6fe62a7bdeb531c675a490e45aef94
-
Filesize
931KB
MD5d154139321e4ffff9417ef51b1ff5562
SHA1e702fefd552be90dcffa390dc21380d927a21014
SHA25620d461c1d66702d07c2c46ace37720359c15e54629ef2b08c226069cbcfbe78b
SHA5125dc9bada4d33f66a5771a50a9dc390500cd0d845920dd5f7d427ce0b59d265e7f4babf22587716f2124dada27b74dcca0d6fe62a7bdeb531c675a490e45aef94
-
Filesize
548KB
MD5ed94bcb904402ee975d0f3fd8c1848a2
SHA1e225c0611a53b1ef39e01a61a6299113dd849a51
SHA256a7e6c4935bf36d575190cacfe866d35461e7692740a7c9e879c65b3e1c2fa733
SHA5126ccd0084982d535b9be03034e5be6db4e5164e8b5ceed94e410b19a6223b804b60a5049d96363de342e33a34362ad75c7fc99b7a891c1f9b9740bdea66dddd66
-
Filesize
548KB
MD5ed94bcb904402ee975d0f3fd8c1848a2
SHA1e225c0611a53b1ef39e01a61a6299113dd849a51
SHA256a7e6c4935bf36d575190cacfe866d35461e7692740a7c9e879c65b3e1c2fa733
SHA5126ccd0084982d535b9be03034e5be6db4e5164e8b5ceed94e410b19a6223b804b60a5049d96363de342e33a34362ad75c7fc99b7a891c1f9b9740bdea66dddd66
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
1.3MB
MD5cbb56f5194ed7600ee65dd46e45208ff
SHA11acb8e322d047207bc098b84e3400699400bd9d2
SHA256ee70b9f0007555cf2dc823e4d1ea7c8e5d911d295947dc2b0c2146c321bedcf6
SHA51283e6fc646da64d536f9cf2802ec4a06042cd8b8a54fe74be4042fe1764038af8b323d51f933cdb5ae39029b2cf361419aefd7a3973cc807c9cf28b9943259829
-
Filesize
1.3MB
MD5cbb56f5194ed7600ee65dd46e45208ff
SHA11acb8e322d047207bc098b84e3400699400bd9d2
SHA256ee70b9f0007555cf2dc823e4d1ea7c8e5d911d295947dc2b0c2146c321bedcf6
SHA51283e6fc646da64d536f9cf2802ec4a06042cd8b8a54fe74be4042fe1764038af8b323d51f933cdb5ae39029b2cf361419aefd7a3973cc807c9cf28b9943259829
-
Filesize
931KB
MD5d154139321e4ffff9417ef51b1ff5562
SHA1e702fefd552be90dcffa390dc21380d927a21014
SHA25620d461c1d66702d07c2c46ace37720359c15e54629ef2b08c226069cbcfbe78b
SHA5125dc9bada4d33f66a5771a50a9dc390500cd0d845920dd5f7d427ce0b59d265e7f4babf22587716f2124dada27b74dcca0d6fe62a7bdeb531c675a490e45aef94
-
Filesize
931KB
MD5d154139321e4ffff9417ef51b1ff5562
SHA1e702fefd552be90dcffa390dc21380d927a21014
SHA25620d461c1d66702d07c2c46ace37720359c15e54629ef2b08c226069cbcfbe78b
SHA5125dc9bada4d33f66a5771a50a9dc390500cd0d845920dd5f7d427ce0b59d265e7f4babf22587716f2124dada27b74dcca0d6fe62a7bdeb531c675a490e45aef94
-
Filesize
548KB
MD5ed94bcb904402ee975d0f3fd8c1848a2
SHA1e225c0611a53b1ef39e01a61a6299113dd849a51
SHA256a7e6c4935bf36d575190cacfe866d35461e7692740a7c9e879c65b3e1c2fa733
SHA5126ccd0084982d535b9be03034e5be6db4e5164e8b5ceed94e410b19a6223b804b60a5049d96363de342e33a34362ad75c7fc99b7a891c1f9b9740bdea66dddd66
-
Filesize
548KB
MD5ed94bcb904402ee975d0f3fd8c1848a2
SHA1e225c0611a53b1ef39e01a61a6299113dd849a51
SHA256a7e6c4935bf36d575190cacfe866d35461e7692740a7c9e879c65b3e1c2fa733
SHA5126ccd0084982d535b9be03034e5be6db4e5164e8b5ceed94e410b19a6223b804b60a5049d96363de342e33a34362ad75c7fc99b7a891c1f9b9740bdea66dddd66
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81