Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
96s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 15:49
Static task
static1
Behavioral task
behavioral1
Sample
79ee06b346525550714c2c84b8fc738fa4f0d261a43b548d9705c36902e25d6e.exe
Resource
win10v2004-20220812-en
General
-
Target
79ee06b346525550714c2c84b8fc738fa4f0d261a43b548d9705c36902e25d6e.exe
-
Size
730KB
-
MD5
9abc4b4b2123372fc5708b34fc26c888
-
SHA1
b2e3b413ea1a31b72f773614835e18e42befee83
-
SHA256
79ee06b346525550714c2c84b8fc738fa4f0d261a43b548d9705c36902e25d6e
-
SHA512
a718dedc776e04bf9ddf7790ce68fec7edbe6dd8435b31a9c5d50ca945f2f489703f597ff69b9f88bc357837c5d46a703b9fccfdedf23e09bf23bddea7c1ba57
-
SSDEEP
768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2676 powershell.exe 2676 powershell.exe 4388 powershell.exe 4388 powershell.exe 2760 powershell.exe 2760 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2676 powershell.exe Token: SeDebugPrivilege 5112 79ee06b346525550714c2c84b8fc738fa4f0d261a43b548d9705c36902e25d6e.exe Token: SeDebugPrivilege 4388 powershell.exe Token: SeDebugPrivilege 2760 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5112 wrote to memory of 764 5112 79ee06b346525550714c2c84b8fc738fa4f0d261a43b548d9705c36902e25d6e.exe 83 PID 5112 wrote to memory of 764 5112 79ee06b346525550714c2c84b8fc738fa4f0d261a43b548d9705c36902e25d6e.exe 83 PID 5112 wrote to memory of 764 5112 79ee06b346525550714c2c84b8fc738fa4f0d261a43b548d9705c36902e25d6e.exe 83 PID 764 wrote to memory of 1400 764 cmd.exe 85 PID 764 wrote to memory of 1400 764 cmd.exe 85 PID 764 wrote to memory of 1400 764 cmd.exe 85 PID 764 wrote to memory of 2676 764 cmd.exe 86 PID 764 wrote to memory of 2676 764 cmd.exe 86 PID 764 wrote to memory of 2676 764 cmd.exe 86 PID 764 wrote to memory of 4388 764 cmd.exe 87 PID 764 wrote to memory of 4388 764 cmd.exe 87 PID 764 wrote to memory of 4388 764 cmd.exe 87 PID 764 wrote to memory of 2760 764 cmd.exe 88 PID 764 wrote to memory of 2760 764 cmd.exe 88 PID 764 wrote to memory of 2760 764 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\79ee06b346525550714c2c84b8fc738fa4f0d261a43b548d9705c36902e25d6e.exe"C:\Users\Admin\AppData\Local\Temp\79ee06b346525550714c2c84b8fc738fa4f0d261a43b548d9705c36902e25d6e.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:1400
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5bade1b6824a440738c692141e84e9b3d
SHA19d2f130ff58382b23ee79a00e1e008b2c699042e
SHA256445582a0c3c4c2b14e79dd8c8a3b15773ec75d69aab870a2aae0937b1ca877d5
SHA512faf5cfe978157fb77f84703615fa0abe59929868744a178fbd3f2a81439a442251139d866ff45dec68a7b3020d5d51dd932975d6ba0325a958e7b0a4f5d3d3ac
-
Filesize
18KB
MD57bff0abbde5f8fd1d69e38c60c312a84
SHA1938030e80a50f559e780b854454793abd14e6f3e
SHA2568b6be1651f2279ba77d792dc9c08a1f38dcf6c64b1b0ba1d6ca3402d4fdc3898
SHA51204bc3e0b855029a8075d67261e25da1ed2ee4ca23c7627cccf6dad30650297fe0f8498fb2486b4387cdadd98525c7c9ca1f865a77d2ca2c15bb1c58319856d3c