Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
39s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe
Resource
win10v2004-20220812-en
General
-
Target
0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe
-
Size
117KB
-
MD5
a28a4c1f5c6dd1f53469643d52a4e210
-
SHA1
804405dd42fa6d17e900755be929c3dc21be570b
-
SHA256
0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846
-
SHA512
7b705709f461faa94a4968253f30fb5a35967b690a4d870d5b50f56764b5cbc53c614326753675109092c452925d5f9db8ef5e975b110461caa56b6c05c317c9
-
SSDEEP
3072:BSvFGO9A38UWIV6EUSnOL1iXLG3oiT7eQNyOg6yV+:BSsmGzkL8XyoixxgXV+
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1812 set thread context of 968 1812 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeSystemtimePrivilege 1812 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe Token: SeSystemtimePrivilege 1812 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe Token: SeSystemtimePrivilege 1812 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe Token: SeSystemtimePrivilege 1812 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe Token: SeSystemtimePrivilege 1812 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe Token: SeSystemtimePrivilege 1812 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe Token: SeDebugPrivilege 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1812 wrote to memory of 968 1812 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 28 PID 1812 wrote to memory of 968 1812 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 28 PID 1812 wrote to memory of 968 1812 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 28 PID 1812 wrote to memory of 968 1812 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 28 PID 1812 wrote to memory of 968 1812 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 28 PID 1812 wrote to memory of 968 1812 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 28 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12 PID 968 wrote to memory of 1216 968 0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe 12
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe"C:\Users\Admin\AppData\Local\Temp\0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exeC:\Users\Admin\AppData\Local\Temp\0d6d4c721a5afb4091d77ce6150d5f871ef42b56063fb97cb035410b707df846.exe D:\Hex Proje3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:968
-
-