Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 23:32
Behavioral task
behavioral1
Sample
23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe
Resource
win7-20220901-en
5 signatures
150 seconds
General
-
Target
23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe
-
Size
292KB
-
MD5
4120d44c739b27067288f22c5b42821f
-
SHA1
f4e8ca8df696e603c82ff2995736a707f66907fe
-
SHA256
23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815
-
SHA512
8717c4e1d2656ad99708bf3f687f2694d1c2f08f9a5d6ca0f238cd3a26f501e69a4b5d1c055c8e2c27f433045ae5b408a6026dcc337b5f618d6c0378f6035cd9
-
SSDEEP
6144:vYPOodm30xwcP9n2U82xZkckexoS8pm97WQPUlGQ2:sdm3xc4L24cVoS8c97WyUlC
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2024-55-0x0000000000400000-0x00000000004BC000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe -
Suspicious behavior: MapViewOfSection 21 IoCs
pid Process 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2024 wrote to memory of 368 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 5 PID 2024 wrote to memory of 368 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 5 PID 2024 wrote to memory of 368 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 5 PID 2024 wrote to memory of 368 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 5 PID 2024 wrote to memory of 368 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 5 PID 2024 wrote to memory of 368 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 5 PID 2024 wrote to memory of 368 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 5 PID 2024 wrote to memory of 384 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 4 PID 2024 wrote to memory of 384 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 4 PID 2024 wrote to memory of 384 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 4 PID 2024 wrote to memory of 384 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 4 PID 2024 wrote to memory of 384 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 4 PID 2024 wrote to memory of 384 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 4 PID 2024 wrote to memory of 384 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 4 PID 2024 wrote to memory of 420 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 3 PID 2024 wrote to memory of 420 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 3 PID 2024 wrote to memory of 420 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 3 PID 2024 wrote to memory of 420 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 3 PID 2024 wrote to memory of 420 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 3 PID 2024 wrote to memory of 420 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 3 PID 2024 wrote to memory of 420 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 3 PID 2024 wrote to memory of 468 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2 PID 2024 wrote to memory of 468 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2 PID 2024 wrote to memory of 468 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2 PID 2024 wrote to memory of 468 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2 PID 2024 wrote to memory of 468 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2 PID 2024 wrote to memory of 468 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2 PID 2024 wrote to memory of 468 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 2 PID 2024 wrote to memory of 476 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 1 PID 2024 wrote to memory of 476 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 1 PID 2024 wrote to memory of 476 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 1 PID 2024 wrote to memory of 476 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 1 PID 2024 wrote to memory of 476 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 1 PID 2024 wrote to memory of 476 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 1 PID 2024 wrote to memory of 476 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 1 PID 2024 wrote to memory of 484 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 24 PID 2024 wrote to memory of 484 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 24 PID 2024 wrote to memory of 484 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 24 PID 2024 wrote to memory of 484 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 24 PID 2024 wrote to memory of 484 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 24 PID 2024 wrote to memory of 484 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 24 PID 2024 wrote to memory of 484 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 24 PID 2024 wrote to memory of 588 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 23 PID 2024 wrote to memory of 588 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 23 PID 2024 wrote to memory of 588 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 23 PID 2024 wrote to memory of 588 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 23 PID 2024 wrote to memory of 588 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 23 PID 2024 wrote to memory of 588 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 23 PID 2024 wrote to memory of 588 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 23 PID 2024 wrote to memory of 668 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 22 PID 2024 wrote to memory of 668 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 22 PID 2024 wrote to memory of 668 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 22 PID 2024 wrote to memory of 668 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 22 PID 2024 wrote to memory of 668 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 22 PID 2024 wrote to memory of 668 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 22 PID 2024 wrote to memory of 668 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 22 PID 2024 wrote to memory of 756 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 21 PID 2024 wrote to memory of 756 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 21 PID 2024 wrote to memory of 756 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 21 PID 2024 wrote to memory of 756 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 21 PID 2024 wrote to memory of 756 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 21 PID 2024 wrote to memory of 756 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 21 PID 2024 wrote to memory of 756 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 21 PID 2024 wrote to memory of 800 2024 23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe 7
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:476
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:468
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:800
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1328
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1028
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:796
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:952
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1232
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:284
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:300
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:872
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:832
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:756
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:668
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:588
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:384
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:484
-
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:1840
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe"C:\Users\Admin\AppData\Local\Temp\23fcb6ff1ff008269a740622e77aedecbe13d4e33c0d84660ef5bf41eac97815.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024
-