Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
67s -
max time network
87s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 10:57
Behavioral task
behavioral1
Sample
abece06c86d99b3df5a83d07df58b9a6470c7bec2baf0218d652e95e830bc87c.exe
Resource
win7-20221111-en
4 signatures
150 seconds
General
-
Target
abece06c86d99b3df5a83d07df58b9a6470c7bec2baf0218d652e95e830bc87c.exe
-
Size
6.8MB
-
MD5
4208ed051f64f4673eab58eb9eed24c1
-
SHA1
3c5c3d6795559bddc9c36b777ce5acfc8becd473
-
SHA256
abece06c86d99b3df5a83d07df58b9a6470c7bec2baf0218d652e95e830bc87c
-
SHA512
4e355958aeefa5056921e1dacac57fa93bf917697be86a9feda24ec26232fcad2d5f9dd3cac6bbe2216e2d3f4df050dfc757a0df5336a09433a0f8bad76a2d3d
-
SSDEEP
98304:Ax8QgejMQtmBgeXjbAaWbUhrenEPwvIcR/P5tUpoIwwGTwg+52UGXh65qmo5seaC:Atgf/AMhfovIcR3jnIww9gAAhXxseaa
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1296-59-0x0000000000230000-0x000000000026E000-memory.dmp upx behavioral1/memory/1296-60-0x0000000000230000-0x000000000026E000-memory.dmp upx behavioral1/memory/1296-61-0x0000000000230000-0x000000000026E000-memory.dmp upx behavioral1/memory/1296-65-0x0000000000230000-0x000000000026E000-memory.dmp upx behavioral1/memory/1296-69-0x0000000000230000-0x000000000026E000-memory.dmp upx behavioral1/memory/1296-73-0x0000000000230000-0x000000000026E000-memory.dmp upx behavioral1/memory/1296-77-0x0000000000230000-0x000000000026E000-memory.dmp upx behavioral1/memory/1296-81-0x0000000000230000-0x000000000026E000-memory.dmp upx behavioral1/memory/1296-85-0x0000000000230000-0x000000000026E000-memory.dmp upx behavioral1/memory/1296-87-0x0000000000230000-0x000000000026E000-memory.dmp upx behavioral1/memory/1296-89-0x0000000000230000-0x000000000026E000-memory.dmp upx behavioral1/memory/1296-93-0x0000000000230000-0x000000000026E000-memory.dmp upx behavioral1/memory/1296-95-0x0000000000230000-0x000000000026E000-memory.dmp upx behavioral1/memory/1296-97-0x0000000000230000-0x000000000026E000-memory.dmp upx behavioral1/memory/1296-99-0x0000000000230000-0x000000000026E000-memory.dmp upx behavioral1/memory/1296-91-0x0000000000230000-0x000000000026E000-memory.dmp upx behavioral1/memory/1296-83-0x0000000000230000-0x000000000026E000-memory.dmp upx behavioral1/memory/1296-79-0x0000000000230000-0x000000000026E000-memory.dmp upx behavioral1/memory/1296-75-0x0000000000230000-0x000000000026E000-memory.dmp upx behavioral1/memory/1296-71-0x0000000000230000-0x000000000026E000-memory.dmp upx behavioral1/memory/1296-67-0x0000000000230000-0x000000000026E000-memory.dmp upx behavioral1/memory/1296-101-0x0000000000230000-0x000000000026E000-memory.dmp upx behavioral1/memory/1296-63-0x0000000000230000-0x000000000026E000-memory.dmp upx behavioral1/memory/1296-102-0x0000000000230000-0x000000000026E000-memory.dmp upx -
resource yara_rule behavioral1/memory/1296-54-0x0000000000400000-0x0000000001226000-memory.dmp vmprotect behavioral1/memory/1296-56-0x0000000000400000-0x0000000001226000-memory.dmp vmprotect behavioral1/memory/1296-103-0x0000000000400000-0x0000000001226000-memory.dmp vmprotect -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1296 abece06c86d99b3df5a83d07df58b9a6470c7bec2baf0218d652e95e830bc87c.exe Token: SeIncBasePriorityPrivilege 1296 abece06c86d99b3df5a83d07df58b9a6470c7bec2baf0218d652e95e830bc87c.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1296 abece06c86d99b3df5a83d07df58b9a6470c7bec2baf0218d652e95e830bc87c.exe 1296 abece06c86d99b3df5a83d07df58b9a6470c7bec2baf0218d652e95e830bc87c.exe 1296 abece06c86d99b3df5a83d07df58b9a6470c7bec2baf0218d652e95e830bc87c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\abece06c86d99b3df5a83d07df58b9a6470c7bec2baf0218d652e95e830bc87c.exe"C:\Users\Admin\AppData\Local\Temp\abece06c86d99b3df5a83d07df58b9a6470c7bec2baf0218d652e95e830bc87c.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1296