Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 16:10
Static task
static1
Behavioral task
behavioral1
Sample
8e0068eb77e3189a06f882b781dfb1d3ee76d89a84b8d9cebd7f80d2986e63f9_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8e0068eb77e3189a06f882b781dfb1d3ee76d89a84b8d9cebd7f80d2986e63f9_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
8e0068eb77e3189a06f882b781dfb1d3ee76d89a84b8d9cebd7f80d2986e63f9_JC.exe
-
Size
1.0MB
-
MD5
47061877c9b10cf48d2899edcca2de9e
-
SHA1
32e5c9ae5395f448f8c41e117450def24389983e
-
SHA256
8e0068eb77e3189a06f882b781dfb1d3ee76d89a84b8d9cebd7f80d2986e63f9
-
SHA512
5be4300f1bb7744f61efa616c48960d5b311f2ab56e8c4347ec221d75923812e13b6a934bc7ea32c244bc9085a8eebdf968784f200b4b337a31ed19e6f173119
-
SSDEEP
24576:XyAwZo5Fr4lhgpd+J0vjcu8rIFqDpbYpMx+tmrEU/Y:iAw2rQg2KQuaB/+0rb
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 2496 XE0Nc44.exe 2656 tD0Gm48.exe 2548 Uw7eW38.exe 2636 1cU37TZ2.exe -
Loads dropped DLL 12 IoCs
pid Process 1404 8e0068eb77e3189a06f882b781dfb1d3ee76d89a84b8d9cebd7f80d2986e63f9_JC.exe 2496 XE0Nc44.exe 2496 XE0Nc44.exe 2656 tD0Gm48.exe 2656 tD0Gm48.exe 2548 Uw7eW38.exe 2548 Uw7eW38.exe 2636 1cU37TZ2.exe 2516 WerFault.exe 2516 WerFault.exe 2516 WerFault.exe 2516 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8e0068eb77e3189a06f882b781dfb1d3ee76d89a84b8d9cebd7f80d2986e63f9_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" XE0Nc44.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tD0Gm48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Uw7eW38.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2636 set thread context of 2428 2636 1cU37TZ2.exe 33 -
Program crash 1 IoCs
pid pid_target Process procid_target 2516 2636 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2428 AppLaunch.exe 2428 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2428 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1404 wrote to memory of 2496 1404 8e0068eb77e3189a06f882b781dfb1d3ee76d89a84b8d9cebd7f80d2986e63f9_JC.exe 28 PID 1404 wrote to memory of 2496 1404 8e0068eb77e3189a06f882b781dfb1d3ee76d89a84b8d9cebd7f80d2986e63f9_JC.exe 28 PID 1404 wrote to memory of 2496 1404 8e0068eb77e3189a06f882b781dfb1d3ee76d89a84b8d9cebd7f80d2986e63f9_JC.exe 28 PID 1404 wrote to memory of 2496 1404 8e0068eb77e3189a06f882b781dfb1d3ee76d89a84b8d9cebd7f80d2986e63f9_JC.exe 28 PID 1404 wrote to memory of 2496 1404 8e0068eb77e3189a06f882b781dfb1d3ee76d89a84b8d9cebd7f80d2986e63f9_JC.exe 28 PID 1404 wrote to memory of 2496 1404 8e0068eb77e3189a06f882b781dfb1d3ee76d89a84b8d9cebd7f80d2986e63f9_JC.exe 28 PID 1404 wrote to memory of 2496 1404 8e0068eb77e3189a06f882b781dfb1d3ee76d89a84b8d9cebd7f80d2986e63f9_JC.exe 28 PID 2496 wrote to memory of 2656 2496 XE0Nc44.exe 29 PID 2496 wrote to memory of 2656 2496 XE0Nc44.exe 29 PID 2496 wrote to memory of 2656 2496 XE0Nc44.exe 29 PID 2496 wrote to memory of 2656 2496 XE0Nc44.exe 29 PID 2496 wrote to memory of 2656 2496 XE0Nc44.exe 29 PID 2496 wrote to memory of 2656 2496 XE0Nc44.exe 29 PID 2496 wrote to memory of 2656 2496 XE0Nc44.exe 29 PID 2656 wrote to memory of 2548 2656 tD0Gm48.exe 30 PID 2656 wrote to memory of 2548 2656 tD0Gm48.exe 30 PID 2656 wrote to memory of 2548 2656 tD0Gm48.exe 30 PID 2656 wrote to memory of 2548 2656 tD0Gm48.exe 30 PID 2656 wrote to memory of 2548 2656 tD0Gm48.exe 30 PID 2656 wrote to memory of 2548 2656 tD0Gm48.exe 30 PID 2656 wrote to memory of 2548 2656 tD0Gm48.exe 30 PID 2548 wrote to memory of 2636 2548 Uw7eW38.exe 31 PID 2548 wrote to memory of 2636 2548 Uw7eW38.exe 31 PID 2548 wrote to memory of 2636 2548 Uw7eW38.exe 31 PID 2548 wrote to memory of 2636 2548 Uw7eW38.exe 31 PID 2548 wrote to memory of 2636 2548 Uw7eW38.exe 31 PID 2548 wrote to memory of 2636 2548 Uw7eW38.exe 31 PID 2548 wrote to memory of 2636 2548 Uw7eW38.exe 31 PID 2636 wrote to memory of 2428 2636 1cU37TZ2.exe 33 PID 2636 wrote to memory of 2428 2636 1cU37TZ2.exe 33 PID 2636 wrote to memory of 2428 2636 1cU37TZ2.exe 33 PID 2636 wrote to memory of 2428 2636 1cU37TZ2.exe 33 PID 2636 wrote to memory of 2428 2636 1cU37TZ2.exe 33 PID 2636 wrote to memory of 2428 2636 1cU37TZ2.exe 33 PID 2636 wrote to memory of 2428 2636 1cU37TZ2.exe 33 PID 2636 wrote to memory of 2428 2636 1cU37TZ2.exe 33 PID 2636 wrote to memory of 2428 2636 1cU37TZ2.exe 33 PID 2636 wrote to memory of 2428 2636 1cU37TZ2.exe 33 PID 2636 wrote to memory of 2428 2636 1cU37TZ2.exe 33 PID 2636 wrote to memory of 2428 2636 1cU37TZ2.exe 33 PID 2636 wrote to memory of 2516 2636 1cU37TZ2.exe 34 PID 2636 wrote to memory of 2516 2636 1cU37TZ2.exe 34 PID 2636 wrote to memory of 2516 2636 1cU37TZ2.exe 34 PID 2636 wrote to memory of 2516 2636 1cU37TZ2.exe 34 PID 2636 wrote to memory of 2516 2636 1cU37TZ2.exe 34 PID 2636 wrote to memory of 2516 2636 1cU37TZ2.exe 34 PID 2636 wrote to memory of 2516 2636 1cU37TZ2.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e0068eb77e3189a06f882b781dfb1d3ee76d89a84b8d9cebd7f80d2986e63f9_JC.exe"C:\Users\Admin\AppData\Local\Temp\8e0068eb77e3189a06f882b781dfb1d3ee76d89a84b8d9cebd7f80d2986e63f9_JC.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\XE0Nc44.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\XE0Nc44.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tD0Gm48.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tD0Gm48.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Uw7eW38.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Uw7eW38.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1cU37TZ2.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1cU37TZ2.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:2516
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
905KB
MD5ec57596e52847a07703bb79feada2f72
SHA185db8fc2bd432ba58984e0cbfb2b6e58cc773338
SHA256cc50044f1d5d3c64e22cb5235aa8dccbc6ea4d3d8b80b31056964c4c0ce3c57a
SHA512b56a13389203f45a77f16fe4f017ccd38113c10dcec33ece20d277760afdfe47de92e033e26c3286e3f4eb1462e4e76202a3da14bf224a023b1d3e94224d662c
-
Filesize
905KB
MD5ec57596e52847a07703bb79feada2f72
SHA185db8fc2bd432ba58984e0cbfb2b6e58cc773338
SHA256cc50044f1d5d3c64e22cb5235aa8dccbc6ea4d3d8b80b31056964c4c0ce3c57a
SHA512b56a13389203f45a77f16fe4f017ccd38113c10dcec33ece20d277760afdfe47de92e033e26c3286e3f4eb1462e4e76202a3da14bf224a023b1d3e94224d662c
-
Filesize
617KB
MD5179649a8be3c4a9aea09031087e807f5
SHA1cc4efd0a20eb1b0ae1fb87a0b622eae9dfe249a0
SHA256e97ecc47a5364a94341d69d12ed6d24b1175be5fdbad02d34ab8c9425dbc8d15
SHA512dcd0e8192f3adf36a1772d51a0e446fdadd091c7e87e37220792b66cef9447eacbc198aec402913bef784f01f0a4731053445374f0a6bf8e49c54728c2653130
-
Filesize
617KB
MD5179649a8be3c4a9aea09031087e807f5
SHA1cc4efd0a20eb1b0ae1fb87a0b622eae9dfe249a0
SHA256e97ecc47a5364a94341d69d12ed6d24b1175be5fdbad02d34ab8c9425dbc8d15
SHA512dcd0e8192f3adf36a1772d51a0e446fdadd091c7e87e37220792b66cef9447eacbc198aec402913bef784f01f0a4731053445374f0a6bf8e49c54728c2653130
-
Filesize
379KB
MD53784353c0fc5620c899a192ed31dda9c
SHA14bdf21ec3ae3aa55ee88653e566fb0c68bf71e60
SHA256d5fdd0533351427533c49acd9822ce66f8e2c93b7558f2ef18d13c0012037cb9
SHA512f9c196fdfe7ef04f0c73e200562f2f55131d4970d81c6f1fff6d58973db95ea9bfd7cb60ab1c407fb4204592bae695c50b6d78e30b7472b760e218ff3d18c8b5
-
Filesize
379KB
MD53784353c0fc5620c899a192ed31dda9c
SHA14bdf21ec3ae3aa55ee88653e566fb0c68bf71e60
SHA256d5fdd0533351427533c49acd9822ce66f8e2c93b7558f2ef18d13c0012037cb9
SHA512f9c196fdfe7ef04f0c73e200562f2f55131d4970d81c6f1fff6d58973db95ea9bfd7cb60ab1c407fb4204592bae695c50b6d78e30b7472b760e218ff3d18c8b5
-
Filesize
237KB
MD5f68871628459c331873e14801cb6bfec
SHA1c7fe3bd998dd36f936cfdad61b82b064cb4103dd
SHA2561db8023e12cd9353e3be4ccd77b14192f65edb2330ead54f13b63f2bc56d6b03
SHA512ac5ef14a3737667ad08d03030e4e7ec571fff229efc36d73693d263b91c3b35e2725470e77e70d37f1b41463a967538fea5d437a1bfc9960b2b5bca576144edf
-
Filesize
237KB
MD5f68871628459c331873e14801cb6bfec
SHA1c7fe3bd998dd36f936cfdad61b82b064cb4103dd
SHA2561db8023e12cd9353e3be4ccd77b14192f65edb2330ead54f13b63f2bc56d6b03
SHA512ac5ef14a3737667ad08d03030e4e7ec571fff229efc36d73693d263b91c3b35e2725470e77e70d37f1b41463a967538fea5d437a1bfc9960b2b5bca576144edf
-
Filesize
905KB
MD5ec57596e52847a07703bb79feada2f72
SHA185db8fc2bd432ba58984e0cbfb2b6e58cc773338
SHA256cc50044f1d5d3c64e22cb5235aa8dccbc6ea4d3d8b80b31056964c4c0ce3c57a
SHA512b56a13389203f45a77f16fe4f017ccd38113c10dcec33ece20d277760afdfe47de92e033e26c3286e3f4eb1462e4e76202a3da14bf224a023b1d3e94224d662c
-
Filesize
905KB
MD5ec57596e52847a07703bb79feada2f72
SHA185db8fc2bd432ba58984e0cbfb2b6e58cc773338
SHA256cc50044f1d5d3c64e22cb5235aa8dccbc6ea4d3d8b80b31056964c4c0ce3c57a
SHA512b56a13389203f45a77f16fe4f017ccd38113c10dcec33ece20d277760afdfe47de92e033e26c3286e3f4eb1462e4e76202a3da14bf224a023b1d3e94224d662c
-
Filesize
617KB
MD5179649a8be3c4a9aea09031087e807f5
SHA1cc4efd0a20eb1b0ae1fb87a0b622eae9dfe249a0
SHA256e97ecc47a5364a94341d69d12ed6d24b1175be5fdbad02d34ab8c9425dbc8d15
SHA512dcd0e8192f3adf36a1772d51a0e446fdadd091c7e87e37220792b66cef9447eacbc198aec402913bef784f01f0a4731053445374f0a6bf8e49c54728c2653130
-
Filesize
617KB
MD5179649a8be3c4a9aea09031087e807f5
SHA1cc4efd0a20eb1b0ae1fb87a0b622eae9dfe249a0
SHA256e97ecc47a5364a94341d69d12ed6d24b1175be5fdbad02d34ab8c9425dbc8d15
SHA512dcd0e8192f3adf36a1772d51a0e446fdadd091c7e87e37220792b66cef9447eacbc198aec402913bef784f01f0a4731053445374f0a6bf8e49c54728c2653130
-
Filesize
379KB
MD53784353c0fc5620c899a192ed31dda9c
SHA14bdf21ec3ae3aa55ee88653e566fb0c68bf71e60
SHA256d5fdd0533351427533c49acd9822ce66f8e2c93b7558f2ef18d13c0012037cb9
SHA512f9c196fdfe7ef04f0c73e200562f2f55131d4970d81c6f1fff6d58973db95ea9bfd7cb60ab1c407fb4204592bae695c50b6d78e30b7472b760e218ff3d18c8b5
-
Filesize
379KB
MD53784353c0fc5620c899a192ed31dda9c
SHA14bdf21ec3ae3aa55ee88653e566fb0c68bf71e60
SHA256d5fdd0533351427533c49acd9822ce66f8e2c93b7558f2ef18d13c0012037cb9
SHA512f9c196fdfe7ef04f0c73e200562f2f55131d4970d81c6f1fff6d58973db95ea9bfd7cb60ab1c407fb4204592bae695c50b6d78e30b7472b760e218ff3d18c8b5
-
Filesize
237KB
MD5f68871628459c331873e14801cb6bfec
SHA1c7fe3bd998dd36f936cfdad61b82b064cb4103dd
SHA2561db8023e12cd9353e3be4ccd77b14192f65edb2330ead54f13b63f2bc56d6b03
SHA512ac5ef14a3737667ad08d03030e4e7ec571fff229efc36d73693d263b91c3b35e2725470e77e70d37f1b41463a967538fea5d437a1bfc9960b2b5bca576144edf
-
Filesize
237KB
MD5f68871628459c331873e14801cb6bfec
SHA1c7fe3bd998dd36f936cfdad61b82b064cb4103dd
SHA2561db8023e12cd9353e3be4ccd77b14192f65edb2330ead54f13b63f2bc56d6b03
SHA512ac5ef14a3737667ad08d03030e4e7ec571fff229efc36d73693d263b91c3b35e2725470e77e70d37f1b41463a967538fea5d437a1bfc9960b2b5bca576144edf
-
Filesize
237KB
MD5f68871628459c331873e14801cb6bfec
SHA1c7fe3bd998dd36f936cfdad61b82b064cb4103dd
SHA2561db8023e12cd9353e3be4ccd77b14192f65edb2330ead54f13b63f2bc56d6b03
SHA512ac5ef14a3737667ad08d03030e4e7ec571fff229efc36d73693d263b91c3b35e2725470e77e70d37f1b41463a967538fea5d437a1bfc9960b2b5bca576144edf
-
Filesize
237KB
MD5f68871628459c331873e14801cb6bfec
SHA1c7fe3bd998dd36f936cfdad61b82b064cb4103dd
SHA2561db8023e12cd9353e3be4ccd77b14192f65edb2330ead54f13b63f2bc56d6b03
SHA512ac5ef14a3737667ad08d03030e4e7ec571fff229efc36d73693d263b91c3b35e2725470e77e70d37f1b41463a967538fea5d437a1bfc9960b2b5bca576144edf
-
Filesize
237KB
MD5f68871628459c331873e14801cb6bfec
SHA1c7fe3bd998dd36f936cfdad61b82b064cb4103dd
SHA2561db8023e12cd9353e3be4ccd77b14192f65edb2330ead54f13b63f2bc56d6b03
SHA512ac5ef14a3737667ad08d03030e4e7ec571fff229efc36d73693d263b91c3b35e2725470e77e70d37f1b41463a967538fea5d437a1bfc9960b2b5bca576144edf
-
Filesize
237KB
MD5f68871628459c331873e14801cb6bfec
SHA1c7fe3bd998dd36f936cfdad61b82b064cb4103dd
SHA2561db8023e12cd9353e3be4ccd77b14192f65edb2330ead54f13b63f2bc56d6b03
SHA512ac5ef14a3737667ad08d03030e4e7ec571fff229efc36d73693d263b91c3b35e2725470e77e70d37f1b41463a967538fea5d437a1bfc9960b2b5bca576144edf