Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
161s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 16:11 UTC
Behavioral task
behavioral1
Sample
a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe
Resource
win10v2004-20220812-en
General
-
Target
a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe
-
Size
48KB
-
MD5
1ff8070c0dd9246a11822761780f492a
-
SHA1
433f41cb11d107bf2c44a28f5ca3019d3505796b
-
SHA256
a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60
-
SHA512
285e4755cb43acbbf34a0b14347e3f347013d348a261238592a3d71ea795a95a3cd3e9b17d8bb8f6f877cc08a3a8028ef1171f3dd1326fb8458a9048d13505a1
-
SSDEEP
768:NR8Yv0lgin6gxLRiSAOvJ6L5WhvkBEpKeeQybU7X1cDuhsqfGzzqwx+e1w:TSnNXvtCXgb1cZPzTxH
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Windows Protection = "C:\\Windows\\FireWall.exe" a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Windows Update = "C:\\Windows\\system32\\WinUpdate.exe" a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe -
resource yara_rule behavioral2/memory/5092-132-0x0000000010000000-0x000000001001A000-memory.dmp upx behavioral2/memory/5092-137-0x0000000010000000-0x000000001001A000-memory.dmp upx behavioral2/memory/4300-139-0x0000000010000000-0x000000001001A000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinUpdate.exe a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe File opened for modification C:\Windows\SysWOW64\WinUpdate.exe a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5092 set thread context of 4300 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 80 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\FireWall.exe a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe Token: SeDebugPrivilege 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe Token: SeDebugPrivilege 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 5092 wrote to memory of 4300 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 80 PID 5092 wrote to memory of 4300 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 80 PID 5092 wrote to memory of 4300 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 80 PID 5092 wrote to memory of 4300 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 80 PID 5092 wrote to memory of 4300 5092 a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe"C:\Users\Admin\AppData\Local\Temp\a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe"1⤵
- Adds policy Run key to start application
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exeC:\Users\Admin\AppData\Local\Temp\a907c441cdafdee27259492e0b5b3c0383f675dbd164d68978823c2057decb60.exe2⤵PID:4300
-
Network
-
Remote address:8.8.8.8:53Request226.101.242.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requesta.2.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.5.0.8.0.0.3.0.1.3.0.6.2.ip6.arpaIN PTRResponse