Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2022, 11:41
Static task
static1
Behavioral task
behavioral1
Sample
#PO47947488-02-2022-BUY-REQUEST.exe
Resource
win7-20220812-en
14 signatures
150 seconds
Behavioral task
behavioral2
Sample
#PO47947488-02-2022-BUY-REQUEST.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
#PO47947488-02-2022-BUY-REQUEST.exe
-
Size
17KB
-
MD5
932c6c73b43ea277f8038fcac487fece
-
SHA1
b151a024d9e78adca105c627ae53fd3343ef4469
-
SHA256
e25681e1fa9f84e578c0c54c9283bb819074fe45b3551e549363c1112cfa3fc4
-
SHA512
7db205d0435206cef2a324fa90e5de21db1d240367e9ab31fe7e91f5a20210135a06d10c51b62ca7197377abf17fcfc846d7d1de0f6b4ef91812cbff6cb2142c
-
SSDEEP
384:g1zC9ECor5d6ARZN/5oL3u6cBKHmrnMff3eE5Qf4:3orHgmrMX3ek
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4468 4616 WerFault.exe 79 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4616 #PO47947488-02-2022-BUY-REQUEST.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\#PO47947488-02-2022-BUY-REQUEST.exe"C:\Users\Admin\AppData\Local\Temp\#PO47947488-02-2022-BUY-REQUEST.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 15162⤵
- Program crash
PID:4468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4616 -ip 46161⤵PID:216