Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
203s -
max time network
219s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 22:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
g7306605.exe
Resource
win7-20230831-en
7 signatures
150 seconds
General
-
Target
g7306605.exe
-
Size
213KB
-
MD5
ba2e40d2cf49ce7901cc39e793ed4109
-
SHA1
0e1814555f7b66886d9bce7a2497c65395e3663c
-
SHA256
9d47a47a910ce3505288372749c21ba14978721946403aba4df7cff52aceb9c4
-
SHA512
3f863210fba8af719c52cc69460feb652be6c0abf9ea727e940e637a61cf458b532e5c630ea6d8027984dd7f31875b59ebf1375727e27efc28b837a9ba98bf63
-
SSDEEP
6144:OQQiKL/yfYb5B+BO99c0s0ZVtAOCgvE9:JQ//yfYb5BIQZVtQn9
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/556-0-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4404 set thread context of 556 4404 g7306605.exe 88 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 556 AppLaunch.exe 556 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 556 AppLaunch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4404 wrote to memory of 556 4404 g7306605.exe 88 PID 4404 wrote to memory of 556 4404 g7306605.exe 88 PID 4404 wrote to memory of 556 4404 g7306605.exe 88 PID 4404 wrote to memory of 556 4404 g7306605.exe 88 PID 4404 wrote to memory of 556 4404 g7306605.exe 88 PID 4404 wrote to memory of 556 4404 g7306605.exe 88 PID 4404 wrote to memory of 556 4404 g7306605.exe 88 PID 4404 wrote to memory of 556 4404 g7306605.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\g7306605.exe"C:\Users\Admin\AppData\Local\Temp\g7306605.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:556
-