Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
05/02/2022, 15:52
Static task
static1
Behavioral task
behavioral1
Sample
522a42c27449aba54fa539f28082f1ddc2e8e6ea4f3dd29141f702a5ad82e29f.exe
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
522a42c27449aba54fa539f28082f1ddc2e8e6ea4f3dd29141f702a5ad82e29f.exe
Resource
win10v2004-en-20220113
0 signatures
0 seconds
General
-
Target
522a42c27449aba54fa539f28082f1ddc2e8e6ea4f3dd29141f702a5ad82e29f.exe
-
Size
277KB
-
MD5
87458f08d1c715853dfcbdc7510566be
-
SHA1
7b1a5d9bb21d852a6dbf3146fabb1cd1ca276ed9
-
SHA256
522a42c27449aba54fa539f28082f1ddc2e8e6ea4f3dd29141f702a5ad82e29f
-
SHA512
ed91a9a42c494076d5a57bde8d8c3247e8fa1bcf85af8e36e304d9dfd00223b2f4f306c1b3474d3afe7d6b2f9f77dc7b579d3d7b96770699d88e947dc2c685c3
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 2796 svchost.exe Token: SeCreatePagefilePrivilege 2796 svchost.exe Token: SeShutdownPrivilege 2796 svchost.exe Token: SeCreatePagefilePrivilege 2796 svchost.exe Token: SeShutdownPrivilege 2796 svchost.exe Token: SeCreatePagefilePrivilege 2796 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\522a42c27449aba54fa539f28082f1ddc2e8e6ea4f3dd29141f702a5ad82e29f.exe"C:\Users\Admin\AppData\Local\Temp\522a42c27449aba54fa539f28082f1ddc2e8e6ea4f3dd29141f702a5ad82e29f.exe"1⤵PID:3256
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2796