Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
202s -
max time network
78s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 23:18
Behavioral task
behavioral1
Sample
chrome.exe
Resource
win7-20221111-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
chrome.exe
Resource
win10v2004-20221111-en
5 signatures
150 seconds
General
-
Target
chrome.exe
-
Size
120KB
-
MD5
978d9c2bef2e61503734411dff1b6d57
-
SHA1
a35e43c01957fcc989707dc059433d0c3774f5f1
-
SHA256
9b07816bdd653b96cc345dc013db13b16707a64fd68a78ef43e1db78f25480b0
-
SHA512
1e8819a4696825a680991b53460bdfc1c5c9ce969bc6828123fa1baa22c34ecbdf57fdc24d0e9573ba7f8fddef8d58fa358d40eee7c99271c5d22531dc2bb797
-
SSDEEP
1536:b7j6kJFKhG29jZ97jr+64JF91AcN4cMgGylloMbj82dNJytxvfiWHtaEvRwW:T6MMA29LS64L91dLytdfZHtaEvd
Score
8/10
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1716 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d5a38e9b5f206c41f8851bf04a251d26.exe chrome.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d5a38e9b5f206c41f8851bf04a251d26.exe chrome.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1224 chrome.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1224 wrote to memory of 1716 1224 chrome.exe 28 PID 1224 wrote to memory of 1716 1224 chrome.exe 28 PID 1224 wrote to memory of 1716 1224 chrome.exe 28 PID 1224 wrote to memory of 1716 1224 chrome.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe"1⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\chrome.exe" "chrome.exe" ENABLE2⤵
- Modifies Windows Firewall
PID:1716
-