Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
48s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
10/05/2021, 11:11
Static task
static1
Behavioral task
behavioral1
Sample
87340668e51cf15aeec2dcd25a175dec9f7e21d75dfe48b6e616be18303d8160.exe
Resource
win7v20210408
0 signatures
0 seconds
General
-
Target
87340668e51cf15aeec2dcd25a175dec9f7e21d75dfe48b6e616be18303d8160.exe
-
Size
24.1MB
-
MD5
0133f61282f43f2a26cf70862d48c74e
-
SHA1
7be462821f7988498c1cfaf793fef71f020f843e
-
SHA256
87340668e51cf15aeec2dcd25a175dec9f7e21d75dfe48b6e616be18303d8160
-
SHA512
851bbbd65e6d13ab93aafcc8a5490b9b24f3820a2e9ce24a32f5371f0880dc9e736c1db614ca825fdc6d18f962506afee4024ff521b8e62a010c71dc69051509
Malware Config
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 3440 created 804 3440 WerFault.exe 67 -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\firefox.exe 87340668e51cf15aeec2dcd25a175dec9f7e21d75dfe48b6e616be18303d8160.exe File created C:\Windows\SysWOW64\firefox.exe 87340668e51cf15aeec2dcd25a175dec9f7e21d75dfe48b6e616be18303d8160.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3440 804 WerFault.exe 67 -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 804 87340668e51cf15aeec2dcd25a175dec9f7e21d75dfe48b6e616be18303d8160.exe 804 87340668e51cf15aeec2dcd25a175dec9f7e21d75dfe48b6e616be18303d8160.exe 3440 WerFault.exe 3440 WerFault.exe 3440 WerFault.exe 3440 WerFault.exe 3440 WerFault.exe 3440 WerFault.exe 3440 WerFault.exe 3440 WerFault.exe 3440 WerFault.exe 3440 WerFault.exe 3440 WerFault.exe 3440 WerFault.exe 3440 WerFault.exe 3440 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3440 WerFault.exe Token: SeBackupPrivilege 3440 WerFault.exe Token: SeDebugPrivilege 3440 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87340668e51cf15aeec2dcd25a175dec9f7e21d75dfe48b6e616be18303d8160.exe"C:\Users\Admin\AppData\Local\Temp\87340668e51cf15aeec2dcd25a175dec9f7e21d75dfe48b6e616be18303d8160.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 804 -s 5442⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3440
-