Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
240s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 04:23
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
1.2MB
-
MD5
f4a7daf100b3e45a6585e83be9df6e17
-
SHA1
6473370285abb5b2dc4a8d1922a04633d60d7638
-
SHA256
dcb5fc049c86e199973bd981e93ebce9d49575f000197430637eb8a32437da86
-
SHA512
3d42a8ed65f8b567e501efba85259f4b58630534f31bc40a433da7ee26c23de14f802bd2205746bf87b5ddd9bedd44fb689f28cefc9b2ee4df8c22a2540a5fce
-
SSDEEP
24576:cyIbWnfidkI5z7QaYi+3+jDc39URRMW/61wQxEMC5tzFpWb+GMSy2dDuC2DC:LIbOgtQf93+/G9UsW/61wCzgdFqMl2dF
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 2476 PE6yV39.exe 2668 MC9fS29.exe 2580 pW4lR89.exe 2532 1hz42fy9.exe -
Loads dropped DLL 12 IoCs
pid Process 2680 file.exe 2476 PE6yV39.exe 2476 PE6yV39.exe 2668 MC9fS29.exe 2668 MC9fS29.exe 2580 pW4lR89.exe 2580 pW4lR89.exe 2532 1hz42fy9.exe 3004 WerFault.exe 3004 WerFault.exe 3004 WerFault.exe 3004 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" PE6yV39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" MC9fS29.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" pW4lR89.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2532 set thread context of 3000 2532 1hz42fy9.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 3004 2532 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3000 AppLaunch.exe 3000 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3000 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2476 2680 file.exe 26 PID 2680 wrote to memory of 2476 2680 file.exe 26 PID 2680 wrote to memory of 2476 2680 file.exe 26 PID 2680 wrote to memory of 2476 2680 file.exe 26 PID 2680 wrote to memory of 2476 2680 file.exe 26 PID 2680 wrote to memory of 2476 2680 file.exe 26 PID 2680 wrote to memory of 2476 2680 file.exe 26 PID 2476 wrote to memory of 2668 2476 PE6yV39.exe 27 PID 2476 wrote to memory of 2668 2476 PE6yV39.exe 27 PID 2476 wrote to memory of 2668 2476 PE6yV39.exe 27 PID 2476 wrote to memory of 2668 2476 PE6yV39.exe 27 PID 2476 wrote to memory of 2668 2476 PE6yV39.exe 27 PID 2476 wrote to memory of 2668 2476 PE6yV39.exe 27 PID 2476 wrote to memory of 2668 2476 PE6yV39.exe 27 PID 2668 wrote to memory of 2580 2668 MC9fS29.exe 28 PID 2668 wrote to memory of 2580 2668 MC9fS29.exe 28 PID 2668 wrote to memory of 2580 2668 MC9fS29.exe 28 PID 2668 wrote to memory of 2580 2668 MC9fS29.exe 28 PID 2668 wrote to memory of 2580 2668 MC9fS29.exe 28 PID 2668 wrote to memory of 2580 2668 MC9fS29.exe 28 PID 2668 wrote to memory of 2580 2668 MC9fS29.exe 28 PID 2580 wrote to memory of 2532 2580 pW4lR89.exe 29 PID 2580 wrote to memory of 2532 2580 pW4lR89.exe 29 PID 2580 wrote to memory of 2532 2580 pW4lR89.exe 29 PID 2580 wrote to memory of 2532 2580 pW4lR89.exe 29 PID 2580 wrote to memory of 2532 2580 pW4lR89.exe 29 PID 2580 wrote to memory of 2532 2580 pW4lR89.exe 29 PID 2580 wrote to memory of 2532 2580 pW4lR89.exe 29 PID 2532 wrote to memory of 3000 2532 1hz42fy9.exe 30 PID 2532 wrote to memory of 3000 2532 1hz42fy9.exe 30 PID 2532 wrote to memory of 3000 2532 1hz42fy9.exe 30 PID 2532 wrote to memory of 3000 2532 1hz42fy9.exe 30 PID 2532 wrote to memory of 3000 2532 1hz42fy9.exe 30 PID 2532 wrote to memory of 3000 2532 1hz42fy9.exe 30 PID 2532 wrote to memory of 3000 2532 1hz42fy9.exe 30 PID 2532 wrote to memory of 3000 2532 1hz42fy9.exe 30 PID 2532 wrote to memory of 3000 2532 1hz42fy9.exe 30 PID 2532 wrote to memory of 3000 2532 1hz42fy9.exe 30 PID 2532 wrote to memory of 3000 2532 1hz42fy9.exe 30 PID 2532 wrote to memory of 3000 2532 1hz42fy9.exe 30 PID 2532 wrote to memory of 3004 2532 1hz42fy9.exe 31 PID 2532 wrote to memory of 3004 2532 1hz42fy9.exe 31 PID 2532 wrote to memory of 3004 2532 1hz42fy9.exe 31 PID 2532 wrote to memory of 3004 2532 1hz42fy9.exe 31 PID 2532 wrote to memory of 3004 2532 1hz42fy9.exe 31 PID 2532 wrote to memory of 3004 2532 1hz42fy9.exe 31 PID 2532 wrote to memory of 3004 2532 1hz42fy9.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PE6yV39.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PE6yV39.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\MC9fS29.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\MC9fS29.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pW4lR89.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pW4lR89.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1hz42fy9.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1hz42fy9.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:3004
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5356e5ddc1efb265c417b4e4558c0e9c5
SHA14757b34452a70caca7bc4cb382abbc6268545ad6
SHA256f37262e962c7975f9ec76e4786ec34e52037aaf3a545dd6b4ca778c8199e9d4f
SHA512cdf1cc43b9ca97f63d97f6c4670d039630c399ecc4b9af8aef9998d3b9111a69fe727fe705a224e490ddfb1a7e41dd52763abf3c74c2a43efe8169636939cb75
-
Filesize
1.1MB
MD5356e5ddc1efb265c417b4e4558c0e9c5
SHA14757b34452a70caca7bc4cb382abbc6268545ad6
SHA256f37262e962c7975f9ec76e4786ec34e52037aaf3a545dd6b4ca778c8199e9d4f
SHA512cdf1cc43b9ca97f63d97f6c4670d039630c399ecc4b9af8aef9998d3b9111a69fe727fe705a224e490ddfb1a7e41dd52763abf3c74c2a43efe8169636939cb75
-
Filesize
691KB
MD535844a38bd2078f1110dc0262a63004b
SHA19e4789536bc48d3040ad20e9ab2dc8e905a05c31
SHA256b986170f7ee5b589640de47a39c42fa9df8af5e8fe95b50a0e55047f396a20eb
SHA512ae87067ab234c15a31f3c1a3eca3d801e794ca5825336f089eaee7cdba105ea36837d7cfa24257b8831c08568691c89d926b4ee0ffd8773a1b64928a0953b7d9
-
Filesize
691KB
MD535844a38bd2078f1110dc0262a63004b
SHA19e4789536bc48d3040ad20e9ab2dc8e905a05c31
SHA256b986170f7ee5b589640de47a39c42fa9df8af5e8fe95b50a0e55047f396a20eb
SHA512ae87067ab234c15a31f3c1a3eca3d801e794ca5825336f089eaee7cdba105ea36837d7cfa24257b8831c08568691c89d926b4ee0ffd8773a1b64928a0953b7d9
-
Filesize
330KB
MD5e1ca8607753275ecdab87cae9b42cd8e
SHA12c64cec3fbf1815b34bf8068e8dc6193408ce8e3
SHA256ae8e1d74335e349d50e79f1d5a58cc0f51f03258740d895af60f88eeae6f0f66
SHA512ede03eb07cd1923e95eec1249c4ecd77e02b7ae9bdefa9b11261fee41358ab63b95ff4c1847907108fe4bdc6517c5cf95c0d5f0ce78572b168a9ce44994bb4a4
-
Filesize
330KB
MD5e1ca8607753275ecdab87cae9b42cd8e
SHA12c64cec3fbf1815b34bf8068e8dc6193408ce8e3
SHA256ae8e1d74335e349d50e79f1d5a58cc0f51f03258740d895af60f88eeae6f0f66
SHA512ede03eb07cd1923e95eec1249c4ecd77e02b7ae9bdefa9b11261fee41358ab63b95ff4c1847907108fe4bdc6517c5cf95c0d5f0ce78572b168a9ce44994bb4a4
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
1.1MB
MD5356e5ddc1efb265c417b4e4558c0e9c5
SHA14757b34452a70caca7bc4cb382abbc6268545ad6
SHA256f37262e962c7975f9ec76e4786ec34e52037aaf3a545dd6b4ca778c8199e9d4f
SHA512cdf1cc43b9ca97f63d97f6c4670d039630c399ecc4b9af8aef9998d3b9111a69fe727fe705a224e490ddfb1a7e41dd52763abf3c74c2a43efe8169636939cb75
-
Filesize
1.1MB
MD5356e5ddc1efb265c417b4e4558c0e9c5
SHA14757b34452a70caca7bc4cb382abbc6268545ad6
SHA256f37262e962c7975f9ec76e4786ec34e52037aaf3a545dd6b4ca778c8199e9d4f
SHA512cdf1cc43b9ca97f63d97f6c4670d039630c399ecc4b9af8aef9998d3b9111a69fe727fe705a224e490ddfb1a7e41dd52763abf3c74c2a43efe8169636939cb75
-
Filesize
691KB
MD535844a38bd2078f1110dc0262a63004b
SHA19e4789536bc48d3040ad20e9ab2dc8e905a05c31
SHA256b986170f7ee5b589640de47a39c42fa9df8af5e8fe95b50a0e55047f396a20eb
SHA512ae87067ab234c15a31f3c1a3eca3d801e794ca5825336f089eaee7cdba105ea36837d7cfa24257b8831c08568691c89d926b4ee0ffd8773a1b64928a0953b7d9
-
Filesize
691KB
MD535844a38bd2078f1110dc0262a63004b
SHA19e4789536bc48d3040ad20e9ab2dc8e905a05c31
SHA256b986170f7ee5b589640de47a39c42fa9df8af5e8fe95b50a0e55047f396a20eb
SHA512ae87067ab234c15a31f3c1a3eca3d801e794ca5825336f089eaee7cdba105ea36837d7cfa24257b8831c08568691c89d926b4ee0ffd8773a1b64928a0953b7d9
-
Filesize
330KB
MD5e1ca8607753275ecdab87cae9b42cd8e
SHA12c64cec3fbf1815b34bf8068e8dc6193408ce8e3
SHA256ae8e1d74335e349d50e79f1d5a58cc0f51f03258740d895af60f88eeae6f0f66
SHA512ede03eb07cd1923e95eec1249c4ecd77e02b7ae9bdefa9b11261fee41358ab63b95ff4c1847907108fe4bdc6517c5cf95c0d5f0ce78572b168a9ce44994bb4a4
-
Filesize
330KB
MD5e1ca8607753275ecdab87cae9b42cd8e
SHA12c64cec3fbf1815b34bf8068e8dc6193408ce8e3
SHA256ae8e1d74335e349d50e79f1d5a58cc0f51f03258740d895af60f88eeae6f0f66
SHA512ede03eb07cd1923e95eec1249c4ecd77e02b7ae9bdefa9b11261fee41358ab63b95ff4c1847907108fe4bdc6517c5cf95c0d5f0ce78572b168a9ce44994bb4a4
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81