Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
186s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 10:57
Behavioral task
behavioral1
Sample
abece06c86d99b3df5a83d07df58b9a6470c7bec2baf0218d652e95e830bc87c.exe
Resource
win7-20221111-en
4 signatures
150 seconds
General
-
Target
abece06c86d99b3df5a83d07df58b9a6470c7bec2baf0218d652e95e830bc87c.exe
-
Size
6.8MB
-
MD5
4208ed051f64f4673eab58eb9eed24c1
-
SHA1
3c5c3d6795559bddc9c36b777ce5acfc8becd473
-
SHA256
abece06c86d99b3df5a83d07df58b9a6470c7bec2baf0218d652e95e830bc87c
-
SHA512
4e355958aeefa5056921e1dacac57fa93bf917697be86a9feda24ec26232fcad2d5f9dd3cac6bbe2216e2d3f4df050dfc757a0df5336a09433a0f8bad76a2d3d
-
SSDEEP
98304:Ax8QgejMQtmBgeXjbAaWbUhrenEPwvIcR/P5tUpoIwwGTwg+52UGXh65qmo5seaC:Atgf/AMhfovIcR3jnIww9gAAhXxseaa
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5092-136-0x0000000003050000-0x000000000308E000-memory.dmp upx behavioral2/memory/5092-137-0x0000000003050000-0x000000000308E000-memory.dmp upx behavioral2/memory/5092-140-0x0000000003050000-0x000000000308E000-memory.dmp upx behavioral2/memory/5092-138-0x0000000003050000-0x000000000308E000-memory.dmp upx behavioral2/memory/5092-142-0x0000000003050000-0x000000000308E000-memory.dmp upx behavioral2/memory/5092-144-0x0000000003050000-0x000000000308E000-memory.dmp upx behavioral2/memory/5092-146-0x0000000003050000-0x000000000308E000-memory.dmp upx behavioral2/memory/5092-148-0x0000000003050000-0x000000000308E000-memory.dmp upx behavioral2/memory/5092-150-0x0000000003050000-0x000000000308E000-memory.dmp upx behavioral2/memory/5092-152-0x0000000003050000-0x000000000308E000-memory.dmp upx behavioral2/memory/5092-154-0x0000000003050000-0x000000000308E000-memory.dmp upx behavioral2/memory/5092-156-0x0000000003050000-0x000000000308E000-memory.dmp upx behavioral2/memory/5092-158-0x0000000003050000-0x000000000308E000-memory.dmp upx behavioral2/memory/5092-160-0x0000000003050000-0x000000000308E000-memory.dmp upx behavioral2/memory/5092-162-0x0000000003050000-0x000000000308E000-memory.dmp upx behavioral2/memory/5092-166-0x0000000003050000-0x000000000308E000-memory.dmp upx behavioral2/memory/5092-164-0x0000000003050000-0x000000000308E000-memory.dmp upx behavioral2/memory/5092-168-0x0000000003050000-0x000000000308E000-memory.dmp upx behavioral2/memory/5092-170-0x0000000003050000-0x000000000308E000-memory.dmp upx behavioral2/memory/5092-174-0x0000000003050000-0x000000000308E000-memory.dmp upx behavioral2/memory/5092-176-0x0000000003050000-0x000000000308E000-memory.dmp upx behavioral2/memory/5092-178-0x0000000003050000-0x000000000308E000-memory.dmp upx behavioral2/memory/5092-180-0x0000000003050000-0x000000000308E000-memory.dmp upx -
resource yara_rule behavioral2/memory/5092-132-0x0000000000400000-0x0000000001226000-memory.dmp vmprotect behavioral2/memory/5092-133-0x0000000000400000-0x0000000001226000-memory.dmp vmprotect behavioral2/memory/5092-172-0x0000000000400000-0x0000000001226000-memory.dmp vmprotect -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 5092 abece06c86d99b3df5a83d07df58b9a6470c7bec2baf0218d652e95e830bc87c.exe Token: SeIncBasePriorityPrivilege 5092 abece06c86d99b3df5a83d07df58b9a6470c7bec2baf0218d652e95e830bc87c.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5092 abece06c86d99b3df5a83d07df58b9a6470c7bec2baf0218d652e95e830bc87c.exe 5092 abece06c86d99b3df5a83d07df58b9a6470c7bec2baf0218d652e95e830bc87c.exe 5092 abece06c86d99b3df5a83d07df58b9a6470c7bec2baf0218d652e95e830bc87c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\abece06c86d99b3df5a83d07df58b9a6470c7bec2baf0218d652e95e830bc87c.exe"C:\Users\Admin\AppData\Local\Temp\abece06c86d99b3df5a83d07df58b9a6470c7bec2baf0218d652e95e830bc87c.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5092