Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
190s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 21:38
Behavioral task
behavioral1
Sample
78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0.exe
Resource
win10v2004-20221111-en
General
-
Target
78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0.exe
-
Size
491KB
-
MD5
9720f355b79d92ecbe7c6cce7cd380f0
-
SHA1
a9b0f95c07e59a012b2d2ab551a22b5f58dd6115
-
SHA256
78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0
-
SHA512
6a5db9192d60222b506463ac6bbeadddf194bcce3e62d8be9b78b90490e2cd1cc457677a18e6d5a40e8ab8afc37e7f9a58631a112321c45b3569da8419693e3e
-
SSDEEP
12288:ui6E4coYqyzAVOMVznTqiJTIUrdYDdYxdtFy70EkoSBXyE:uiJAVXTHTIrDdYJE0EOR
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3276-132-0x0000000000400000-0x0000000000564000-memory.dmp upx behavioral2/memory/3276-133-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3276-134-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3276-135-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3276-137-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3276-139-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3276-141-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3276-143-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3276-145-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3276-147-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3276-149-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3276-151-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3276-153-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3276-155-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3276-157-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3276-159-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3276-161-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3276-163-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3276-165-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3276-167-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3276-169-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3276-171-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3276-173-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3276-175-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3276-177-0x0000000000400000-0x0000000000564000-memory.dmp upx behavioral2/memory/3276-178-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: 33 3276 78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0.exe Token: SeIncBasePriorityPrivilege 3276 78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0.exe Token: 33 3276 78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0.exe Token: SeIncBasePriorityPrivilege 3276 78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0.exe Token: 33 3276 78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0.exe Token: SeIncBasePriorityPrivilege 3276 78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0.exe Token: 33 3276 78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0.exe Token: SeIncBasePriorityPrivilege 3276 78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3276 78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0.exe 3276 78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0.exe 3276 78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0.exe 3276 78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0.exe 3276 78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0.exe 3276 78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3276 wrote to memory of 1800 3276 78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0.exe 85 PID 3276 wrote to memory of 1800 3276 78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0.exe 85 PID 3276 wrote to memory of 1800 3276 78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0.exe 85 PID 3276 wrote to memory of 4744 3276 78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0.exe 86 PID 3276 wrote to memory of 4744 3276 78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0.exe 86 PID 3276 wrote to memory of 4744 3276 78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0.exe"C:\Users\Admin\AppData\Local\Temp\78c444226506028143208fee71413ad99b3ab73072eca55efa2d893fd12c9fa0.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s .\player.dll2⤵PID:1800
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s .\npaplayer.dll2⤵PID:4744
-