Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 21:50
Behavioral task
behavioral1
Sample
c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe
Resource
win7-20220901-en
General
-
Target
c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe
-
Size
745KB
-
MD5
a092e475daedf73ba0e401b9f2c03b30
-
SHA1
e11e3d2f629827d5cd1c0b996f71798667bc05bf
-
SHA256
c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42
-
SHA512
98a0c0532c9248eb7df5632de174af5bc2466843e9658a945b2d896242a25cd92f749bcd677df1c4934683eb60cceb29be16df020acd0228693a1ad3bb6b6d20
-
SSDEEP
12288:4aAchpWsuVTv7ItY8XljyypHP7cOLBev03hlULsmWZ++09ZcKDVsgdE:5AEENIq8XwyVPQclDq/+WnpsS
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4636 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Token: SeSecurityPrivilege 4636 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Token: SeTakeOwnershipPrivilege 4636 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Token: SeLoadDriverPrivilege 4636 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Token: SeSystemProfilePrivilege 4636 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Token: SeSystemtimePrivilege 4636 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Token: SeProfSingleProcessPrivilege 4636 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Token: SeIncBasePriorityPrivilege 4636 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Token: SeCreatePagefilePrivilege 4636 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Token: SeBackupPrivilege 4636 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Token: SeRestorePrivilege 4636 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Token: SeShutdownPrivilege 4636 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Token: SeDebugPrivilege 4636 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Token: SeSystemEnvironmentPrivilege 4636 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Token: SeChangeNotifyPrivilege 4636 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Token: SeRemoteShutdownPrivilege 4636 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Token: SeUndockPrivilege 4636 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Token: SeManageVolumePrivilege 4636 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Token: SeImpersonatePrivilege 4636 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Token: SeCreateGlobalPrivilege 4636 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Token: 33 4636 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Token: 34 4636 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Token: 35 4636 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe Token: 36 4636 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4636 c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe"C:\Users\Admin\AppData\Local\Temp\c52e0803e046e73fdffc4281ce2c9f3510ddc4e267911a2d9d1f5c23810e5c42.exe"1⤵
- Checks BIOS information in registry
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4636