Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
194s -
max time network
200s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18/01/2025, 21:07
Behavioral task
behavioral1
Sample
RC7old.exe
Resource
win7-20241010-en
General
-
Target
RC7old.exe
-
Size
3.1MB
-
MD5
5efb08d03470612d11124136accc84fa
-
SHA1
46abe602f6566ff6103f504ef8ae73f43eae19c1
-
SHA256
853cf003dd01ec972a222a28b1e8b260fb06fab20245e609cb7df103d110343f
-
SHA512
13a1fbeae357662e2e2a60e511a3bce2f63fef40a96ba49f25e745dd466ca3da24de5155f0f2233e8d15941f353a21df14247ab7b4ebf84ee419ca7d7b7ae74a
-
SSDEEP
49152:CvHI22SsaNYfdPBldt698dBcjHuYREEf/yk/65LoGdvYAFTHHB72eh2NT:Cvo22SsaNYfdPBldt6+dBcjHuYRkp
Malware Config
Extracted
quasar
1.4.1
RC7old
yellow-parts.gl.at.ply.gg:52085
8356bffd-2b62-44f9-937c-4adee31d9ea3
-
encryption_key
5471C1CD3CF5D10BA14E0A632D9E07BC5FEE0E2B
-
install_name
RC7old.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
System
-
subdirectory
System
Signatures
-
Quasar family
-
Quasar payload 4 IoCs
resource yara_rule behavioral1/memory/3036-1-0x0000000000B40000-0x0000000000E64000-memory.dmp family_quasar behavioral1/files/0x0005000000012274-6.dat family_quasar behavioral1/memory/2344-9-0x0000000000C50000-0x0000000000F74000-memory.dmp family_quasar behavioral1/memory/1828-10-0x0000000140000000-0x00000001405E8000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2344 RC7old.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\system32\System RC7old.exe File created C:\Windows\system32\System\RC7old.exe RC7old.exe File opened for modification C:\Windows\system32\System\RC7old.exe RC7old.exe File opened for modification C:\Windows\system32\System RC7old.exe File opened for modification C:\Windows\system32\System\RC7old.exe RC7old.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 984 schtasks.exe 2700 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1828 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 3036 RC7old.exe Token: SeDebugPrivilege 2344 RC7old.exe Token: SeDebugPrivilege 1828 taskmgr.exe Token: 33 1720 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1720 AUDIODG.EXE Token: 33 1720 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1720 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2344 RC7old.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2344 RC7old.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe 1828 taskmgr.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3036 wrote to memory of 984 3036 RC7old.exe 40 PID 3036 wrote to memory of 984 3036 RC7old.exe 40 PID 3036 wrote to memory of 984 3036 RC7old.exe 40 PID 3036 wrote to memory of 2344 3036 RC7old.exe 42 PID 3036 wrote to memory of 2344 3036 RC7old.exe 42 PID 3036 wrote to memory of 2344 3036 RC7old.exe 42 PID 2344 wrote to memory of 2700 2344 RC7old.exe 43 PID 2344 wrote to memory of 2700 2344 RC7old.exe 43 PID 2344 wrote to memory of 2700 2344 RC7old.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2276 --field-trial-handle=1284,i,3200620142580441509,16898819340010944638,131072 /prefetch:11⤵PID:1092
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2284 --field-trial-handle=1284,i,3200620142580441509,16898819340010944638,131072 /prefetch:11⤵PID:2752
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\RC7old.exe"C:\Users\Admin\AppData\Local\Temp\RC7old.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Windows\system32\System\RC7old.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:984
-
-
C:\Windows\system32\System\RC7old.exe"C:\Windows\system32\System\RC7old.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Windows\system32\System\RC7old.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2700
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1328 --field-trial-handle=1284,i,3200620142580441509,16898819340010944638,131072 /prefetch:21⤵PID:2556
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --mojo-platform-channel-handle=3316 --field-trial-handle=1284,i,3200620142580441509,16898819340010944638,131072 /prefetch:11⤵PID:564
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3796 --field-trial-handle=1284,i,3200620142580441509,16898819340010944638,131072 /prefetch:81⤵PID:768
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1828
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --mojo-platform-channel-handle=2676 --field-trial-handle=1284,i,3200620142580441509,16898819340010944638,131072 /prefetch:11⤵PID:832
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2572 --field-trial-handle=1284,i,3200620142580441509,16898819340010944638,131072 /prefetch:81⤵PID:1356
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2268 --field-trial-handle=1284,i,3200620142580441509,16898819340010944638,131072 /prefetch:81⤵PID:2324
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x53c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD55efb08d03470612d11124136accc84fa
SHA146abe602f6566ff6103f504ef8ae73f43eae19c1
SHA256853cf003dd01ec972a222a28b1e8b260fb06fab20245e609cb7df103d110343f
SHA51213a1fbeae357662e2e2a60e511a3bce2f63fef40a96ba49f25e745dd466ca3da24de5155f0f2233e8d15941f353a21df14247ab7b4ebf84ee419ca7d7b7ae74a