Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 02:45
Behavioral task
behavioral1
Sample
2ce6f8b5c3afce5aa08afd4ed344a559187889b10a63acd8c6f16c12ef7b5c1c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2ce6f8b5c3afce5aa08afd4ed344a559187889b10a63acd8c6f16c12ef7b5c1c.exe
Resource
win10v2004-20221111-en
General
-
Target
2ce6f8b5c3afce5aa08afd4ed344a559187889b10a63acd8c6f16c12ef7b5c1c.exe
-
Size
297KB
-
MD5
15f5620c21110d48fffb746dfebebe30
-
SHA1
75c2511ffd86bffb8cce3be95ca5c31fcbcbe8aa
-
SHA256
2ce6f8b5c3afce5aa08afd4ed344a559187889b10a63acd8c6f16c12ef7b5c1c
-
SHA512
0545876975d003425a470d0bebcc520c149eca80faf5c013a60afbe70b307b600a867e569f157de430c1d8b1e3fc306b47d975743745b19031c08d932cbee0ff
-
SSDEEP
6144:tfTAnNXmt8CveVRg9KGrT+6xlBP+hHZY7HdxwnjX:tfTAnUtLCg9BtHB+hHZ6jwnjX
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/976-56-0x0000000001000000-0x0000000001073000-memory.dmp upx behavioral1/memory/976-57-0x0000000001000000-0x0000000001073000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\svchost.exe 2ce6f8b5c3afce5aa08afd4ed344a559187889b10a63acd8c6f16c12ef7b5c1c.exe File created \??\c:\windows\SysWOW64\svchost.vir 2ce6f8b5c3afce5aa08afd4ed344a559187889b10a63acd8c6f16c12ef7b5c1c.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe 2ce6f8b5c3afce5aa08afd4ed344a559187889b10a63acd8c6f16c12ef7b5c1c.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_state.exe 2ce6f8b5c3afce5aa08afd4ed344a559187889b10a63acd8c6f16c12ef7b5c1c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 976 2ce6f8b5c3afce5aa08afd4ed344a559187889b10a63acd8c6f16c12ef7b5c1c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 976 wrote to memory of 1924 976 2ce6f8b5c3afce5aa08afd4ed344a559187889b10a63acd8c6f16c12ef7b5c1c.exe 27 PID 976 wrote to memory of 1924 976 2ce6f8b5c3afce5aa08afd4ed344a559187889b10a63acd8c6f16c12ef7b5c1c.exe 27 PID 976 wrote to memory of 1924 976 2ce6f8b5c3afce5aa08afd4ed344a559187889b10a63acd8c6f16c12ef7b5c1c.exe 27 PID 976 wrote to memory of 1924 976 2ce6f8b5c3afce5aa08afd4ed344a559187889b10a63acd8c6f16c12ef7b5c1c.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ce6f8b5c3afce5aa08afd4ed344a559187889b10a63acd8c6f16c12ef7b5c1c.exe"C:\Users\Admin\AppData\Local\Temp\2ce6f8b5c3afce5aa08afd4ed344a559187889b10a63acd8c6f16c12ef7b5c1c.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\system32\ocsetup.exe"C:\Windows\system32\ocsetup.exe"2⤵PID:1924
-