Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

23/08/2024, 16:00

240823-tf47dsteqe 6

23/08/2024, 15:32

240823-sy293sseld 4

23/08/2024, 15:18

240823-sp1d5athqk 8

23/08/2024, 14:12

240823-rjcv7sydnd 7

23/08/2024, 02:33

240823-c17dta1cpd 7

23/08/2024, 02:11

240823-cmbpzszelg 4

23/08/2024, 02:00

240823-ce59mazbnh 4

23/08/2024, 01:37

240823-b1992a1dmm 5

23/08/2024, 01:24

240823-bsm5jazhpp 5

23/08/2024, 00:51

240823-a7p21awhld 6

Analysis

  • max time kernel
    140s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 00:51

General

  • Target

    pwlauncher.exe

  • Size

    52KB

  • MD5

    d0743203ba4eb04ddffdae63c8d6ded7

  • SHA1

    117d5503b2bccf3c00623f5a6fd73213b871ad0e

  • SHA256

    4e8dbb3e89dfd69856c0cce34a6f5960aab1e8d0b42c9dc991accb249e8ec044

  • SHA512

    2bcf60617c5538b466b7263d8a175b9d5747c10126d1c62794b1330a4664885a28a0a1746da5ef26d0727b32bbb8b7b9d2515683e1efad036a1659b4eddb86d6

  • SSDEEP

    768:JRLAuL35vJLgZmdagPZxMGE/GIfUMF0T8QSoe4KG0srxOC2fc+:JRjL35xUcTxgnPF0T8G0srY5fc+

Score
6/10

Malware Config

Signatures

  • Network Service Discovery 1 TTPs 1 IoCs

    Attempt to gather information on host's network.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\pwlauncher.exe
    "C:\Users\Admin\AppData\Local\Temp\pwlauncher.exe"
    1⤵
      PID:3904
    • C:\Windows\System32\GameBarPresenceWriter.exe
      "C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer
      1⤵
      • Network Service Discovery
      PID:2968
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:612
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
      1⤵
      • Checks processor information in registry
      • Modifies registry class
      PID:3932

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads