Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
72s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
Salwyrr Launcher.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Salwyrr Launcher.exe
Resource
win10v2004-20240226-en
General
-
Target
Salwyrr Launcher.exe
-
Size
150.5MB
-
MD5
358fcbfda7fdc5e8966be81cd82e3fc9
-
SHA1
1ca3c9cd0e791c82f139c543449630653447c33a
-
SHA256
bcc98408be7d77e03ca6fd8f1e7e01d30f3b55e3bb236735d514037f6b2da53f
-
SHA512
bc26f6e9395386791a7438e2e2f25644029584e6c318775b20cf8f13d268397b6a0e2f6ad8b2ccf726dc8a1102c6b08cef9a00fbd83855b65b0626deba009956
-
SSDEEP
1572864:ZGdFYlhnXsryUGmVlsdBbd51I8udcDs/VgC5daNcBgBTIWfbgrLvNc3xhRsOmpe:nlhnXr7er5c+rp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2308 chrome.exe 2308 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2332 2308 chrome.exe 29 PID 2308 wrote to memory of 2332 2308 chrome.exe 29 PID 2308 wrote to memory of 2332 2308 chrome.exe 29 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2716 2308 chrome.exe 31 PID 2308 wrote to memory of 2456 2308 chrome.exe 32 PID 2308 wrote to memory of 2456 2308 chrome.exe 32 PID 2308 wrote to memory of 2456 2308 chrome.exe 32 PID 2308 wrote to memory of 2400 2308 chrome.exe 33 PID 2308 wrote to memory of 2400 2308 chrome.exe 33 PID 2308 wrote to memory of 2400 2308 chrome.exe 33 PID 2308 wrote to memory of 2400 2308 chrome.exe 33 PID 2308 wrote to memory of 2400 2308 chrome.exe 33 PID 2308 wrote to memory of 2400 2308 chrome.exe 33 PID 2308 wrote to memory of 2400 2308 chrome.exe 33 PID 2308 wrote to memory of 2400 2308 chrome.exe 33 PID 2308 wrote to memory of 2400 2308 chrome.exe 33 PID 2308 wrote to memory of 2400 2308 chrome.exe 33 PID 2308 wrote to memory of 2400 2308 chrome.exe 33 PID 2308 wrote to memory of 2400 2308 chrome.exe 33 PID 2308 wrote to memory of 2400 2308 chrome.exe 33 PID 2308 wrote to memory of 2400 2308 chrome.exe 33 PID 2308 wrote to memory of 2400 2308 chrome.exe 33 PID 2308 wrote to memory of 2400 2308 chrome.exe 33 PID 2308 wrote to memory of 2400 2308 chrome.exe 33 PID 2308 wrote to memory of 2400 2308 chrome.exe 33 PID 2308 wrote to memory of 2400 2308 chrome.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Salwyrr Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Salwyrr Launcher.exe"1⤵PID:2028
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6569758,0x7fef6569768,0x7fef65697782⤵PID:2332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1372,i,12445242458081908625,17752578118363175008,131072 /prefetch:22⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1372,i,12445242458081908625,17752578118363175008,131072 /prefetch:82⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1552 --field-trial-handle=1372,i,12445242458081908625,17752578118363175008,131072 /prefetch:82⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2236 --field-trial-handle=1372,i,12445242458081908625,17752578118363175008,131072 /prefetch:12⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2244 --field-trial-handle=1372,i,12445242458081908625,17752578118363175008,131072 /prefetch:12⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1472 --field-trial-handle=1372,i,12445242458081908625,17752578118363175008,131072 /prefetch:22⤵PID:1212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=984 --field-trial-handle=1372,i,12445242458081908625,17752578118363175008,131072 /prefetch:12⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3664 --field-trial-handle=1372,i,12445242458081908625,17752578118363175008,131072 /prefetch:82⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3964 --field-trial-handle=1372,i,12445242458081908625,17752578118363175008,131072 /prefetch:12⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1716 --field-trial-handle=1372,i,12445242458081908625,17752578118363175008,131072 /prefetch:82⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=824 --field-trial-handle=1372,i,12445242458081908625,17752578118363175008,131072 /prefetch:12⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195KB
MD5873734b55d4c7d35a177c8318b0caec7
SHA1469b913b09ea5b55e60098c95120cc9b935ddb28
SHA2564ee3aa3dc43cb3ef3f6bfb91ed8214659e9c2600a45bee9728ebbcb6f33b088d
SHA51224f05ed981e994475879ca2221b6948418c4412063b9c07f46b8de581047ddd5d73401562fa9ee54d4ce5f97a6288c54eac5de0ca29b1bb5797bdac5a1b30308
-
Filesize
24KB
MD5b82ca47ee5d42100e589bdd94e57936e
SHA10dad0cd7d0472248b9b409b02122d13bab513b4c
SHA256d3c59060e591b3839ec59cad150c0a38a2a2a6ba4cc4dc5530f68be54f14ef1d
SHA51258840a773a3a6cb0913e6a542934daecaef9c0eeab626446a29a70cd6d063fdb012229ff2ccfa283e3c05bc2a91a7cac331293965264715bdb9020f162dc7383
-
Filesize
168B
MD5dc7d603deb3456aa52ae0a5d54597ab0
SHA13c15964b65bc896ce2c01902c1ae4942a52d5a02
SHA2567b6407de38854af5c5624e7193a103e40e8c98c19ffa0aab841eb20c4313c9c7
SHA512fc8b6343e74133e92598013cc3459921b12ddb21f9033af4fe774f25483a48706caa49d5a31fa30e9eb8aacb796f5ce31ca1c66205ce5754a99ca58b54de4696
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
361B
MD5c6669601eb5de4218fc8b47a13466086
SHA1e9ecad69708d04000d29dd46428dda472803a101
SHA256d529edb164250a83909ccac65e39ad2d872b37b55f18cea51af7e00f004e1a9a
SHA5124cb588b63ea6efb8630608abe6b4e0961eaadd1dd97908125f573e14bb041f469ee663dfaa2f0d343df21b2333aa4a0941e384381a319dac63f671c0a00b8451
-
Filesize
6KB
MD51ccd0f359cea168a9252e8347c88fd3e
SHA180bcdf9d07b55a73d2e71778ba267868687af866
SHA2564566ab5c38b3e9d7df801cebcc7579f4380354363423513125d033fdc0984fd3
SHA512f3ad872a1848e1ad3da7aed8ddeb12f15d8dbfeeff0554b68ae3e1f08fc4d5e82f9cb46dfc316207d50642c99ebd20486686b5e7cba9be4d0bb86875c2b317a7
-
Filesize
5KB
MD5976f19e41bfe5316498a1ab46c8190c8
SHA1f01942fba3bb0e222f85af64e3e57be4b5b1af6a
SHA256664f03db8d307927c45c65dd000b17580636f324d5b9a00b9c25c62f654ca2c6
SHA51252178301fc2109ed0a60de74d11c4ba282cb5e62a918086bedcd1a750d2592028fa90f098cf7561b2024d657d12e60edecdb3be138fc19c5f3a3ba95e7a6533c
-
Filesize
5KB
MD55de8889965db19a4883bf9745ea63ab8
SHA18a8573285df64701594dd656d51d59d7c9b524c2
SHA256d85226124945773be2c8fab5cff6a4bbd0befe0d8621bb518a0d854555473193
SHA5124b5e1966bf189c163c7bd1ef0223ed5ea4f7f6861e143eadb202afc94ef0eae3437a6f1e31fcd8b7c5ce5dd8a9ac1ea34bcf492869b33f616dc692ed613a79d8
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2