Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 03:09
Static task
static1
Behavioral task
behavioral1
Sample
819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe
Resource
win10v2004-20220812-en
General
-
Target
819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe
-
Size
449KB
-
MD5
0fb71e09a9c0d5a45299771df95d8e50
-
SHA1
3297063461cf18a8b874382e0d71f88b9e1b04be
-
SHA256
819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee
-
SHA512
6664144b3f098c2d77f08f714bbf088cb62448082b31c9c4ac2d801259249c3fa7faa91e9ac5d51aa5f179e92f9935d698fe18a90e50ae8217263fe594d9e667
-
SSDEEP
12288:sfsocKRoHJRnJVkcUzVrR6J1O07dvstqPg:sRcfpFJitq83
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4176-134-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4176-136-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4176-137-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4176-138-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4176-139-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4176-141-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4176-145-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4176-143-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4176-147-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4176-149-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4176-151-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4176-153-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4176-155-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4176-157-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4176-159-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4176-161-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4176-163-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4176-165-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4176-167-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4176-169-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4176-171-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4176-173-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4176-175-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4176-177-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4176-179-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4176-180-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: 33 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe Token: SeIncBasePriorityPrivilege 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe 4176 819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe"C:\Users\Admin\AppData\Local\Temp\819ac1f1eae6f36efbf649cc3886b07c9b5843926a2bfad29f28ba8dd42b43ee.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4176