Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
158s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 20:19
Static task
static1
Behavioral task
behavioral1
Sample
enlisted_launcher_1.0.3.127-czkp9u7y4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
enlisted_launcher_1.0.3.127-czkp9u7y4.exe
Resource
win10v2004-20240221-en
General
-
Target
enlisted_launcher_1.0.3.127-czkp9u7y4.exe
-
Size
8.4MB
-
MD5
afd4e574b5cc9a87d85c91ed96ac2a17
-
SHA1
acb7e9df587aaa5b0d1c115670a31bf8d568b230
-
SHA256
17aa55ecf81de6679a77acecca97dfac93914f87dad36e1d20012371edc37f04
-
SHA512
42c3864aaf2bc6e9661b8e935590a52ecc3af2ad950ea531a84147d784c19f03e386d2ee5d3ce2597b1ba217c1f674d443e7f759472b8b5f03994fb9ec4f9ce9
-
SSDEEP
196608:wzEEeKA8Ty0M5jjddI4clFiTyXeXwKaALSQbRuXDoN4XJK:wz9Np/CjjddI5/LuABALSQbaDoN48
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1604 enlisted_launcher_1.0.3.127-czkp9u7y4.tmp -
Loads dropped DLL 1 IoCs
pid Process 1344 enlisted_launcher_1.0.3.127-czkp9u7y4.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1604 enlisted_launcher_1.0.3.127-czkp9u7y4.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1344 wrote to memory of 1604 1344 enlisted_launcher_1.0.3.127-czkp9u7y4.exe 36 PID 1344 wrote to memory of 1604 1344 enlisted_launcher_1.0.3.127-czkp9u7y4.exe 36 PID 1344 wrote to memory of 1604 1344 enlisted_launcher_1.0.3.127-czkp9u7y4.exe 36 PID 1344 wrote to memory of 1604 1344 enlisted_launcher_1.0.3.127-czkp9u7y4.exe 36 PID 1344 wrote to memory of 1604 1344 enlisted_launcher_1.0.3.127-czkp9u7y4.exe 36 PID 1344 wrote to memory of 1604 1344 enlisted_launcher_1.0.3.127-czkp9u7y4.exe 36 PID 1344 wrote to memory of 1604 1344 enlisted_launcher_1.0.3.127-czkp9u7y4.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\enlisted_launcher_1.0.3.127-czkp9u7y4.exe"C:\Users\Admin\AppData\Local\Temp\enlisted_launcher_1.0.3.127-czkp9u7y4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\is-C56Q6.tmp\enlisted_launcher_1.0.3.127-czkp9u7y4.tmp"C:\Users\Admin\AppData\Local\Temp\is-C56Q6.tmp\enlisted_launcher_1.0.3.127-czkp9u7y4.tmp" /SL5="$40168,8136148,235520,C:\Users\Admin\AppData\Local\Temp\enlisted_launcher_1.0.3.127-czkp9u7y4.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:1604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3548 --field-trial-handle=1380,i,6626833033456632255,2946029577563224732,131072 /prefetch:81⤵PID:344
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --mojo-platform-channel-handle=3556 --field-trial-handle=1380,i,6626833033456632255,2946029577563224732,131072 /prefetch:11⤵PID:2180
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=580 --field-trial-handle=1380,i,6626833033456632255,2946029577563224732,131072 /prefetch:81⤵PID:1232
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5e4a4abbc27d38cb7dcec49e0ec0834f3
SHA1cc97d90e88bb2a44e93417a0e573b45b91da337a
SHA25671de1e8162e0fac224cb3240012527a02aad6b066ca7f66b750579936f2650ab
SHA51234e608a988e813057e1688626911efe14faa27da63a3457a93d431599a35613097b54d0d2b9f1470b866f270acd9c259f9dffcdc8967715baea6d3e5fa984f77