Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 22:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
g7306605.exe
Resource
win7-20230831-en
7 signatures
150 seconds
General
-
Target
g7306605.exe
-
Size
213KB
-
MD5
ba2e40d2cf49ce7901cc39e793ed4109
-
SHA1
0e1814555f7b66886d9bce7a2497c65395e3663c
-
SHA256
9d47a47a910ce3505288372749c21ba14978721946403aba4df7cff52aceb9c4
-
SHA512
3f863210fba8af719c52cc69460feb652be6c0abf9ea727e940e637a61cf458b532e5c630ea6d8027984dd7f31875b59ebf1375727e27efc28b837a9ba98bf63
-
SSDEEP
6144:OQQiKL/yfYb5B+BO99c0s0ZVtAOCgvE9:JQ//yfYb5BIQZVtQn9
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 5 IoCs
resource yara_rule behavioral1/memory/2676-5-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2676-3-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2676-2-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2676-9-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2676-7-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2360 set thread context of 2676 2360 g7306605.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2676 AppLaunch.exe 2676 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2676 AppLaunch.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2676 2360 g7306605.exe 29 PID 2360 wrote to memory of 2676 2360 g7306605.exe 29 PID 2360 wrote to memory of 2676 2360 g7306605.exe 29 PID 2360 wrote to memory of 2676 2360 g7306605.exe 29 PID 2360 wrote to memory of 2676 2360 g7306605.exe 29 PID 2360 wrote to memory of 2676 2360 g7306605.exe 29 PID 2360 wrote to memory of 2676 2360 g7306605.exe 29 PID 2360 wrote to memory of 2676 2360 g7306605.exe 29 PID 2360 wrote to memory of 2676 2360 g7306605.exe 29 PID 2360 wrote to memory of 2676 2360 g7306605.exe 29 PID 2360 wrote to memory of 2676 2360 g7306605.exe 29 PID 2360 wrote to memory of 2676 2360 g7306605.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\g7306605.exe"C:\Users\Admin\AppData\Local\Temp\g7306605.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2676
-