Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
79s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 23:24 UTC
Static task
static1
Behavioral task
behavioral1
Sample
c55f09a891e4f5a810b755fb45b440da012f858d12751d46308231e5a02429ee.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c55f09a891e4f5a810b755fb45b440da012f858d12751d46308231e5a02429ee.exe
Resource
win10v2004-20221111-en
General
-
Target
c55f09a891e4f5a810b755fb45b440da012f858d12751d46308231e5a02429ee.exe
-
Size
124KB
-
MD5
a28c569bd67c67f65c33780fbc05f620
-
SHA1
b71dff23283c19f85588280bb4211437b0c0b466
-
SHA256
c55f09a891e4f5a810b755fb45b440da012f858d12751d46308231e5a02429ee
-
SHA512
ed7e2b7e6d009008e841e12b3200511cae0d4fb7635eb505b4d133085af45fd2a2ad0c9c9f7c49c144bb5bb423faa570ccf9c555031bb8433d40f528b13ec66a
-
SSDEEP
3072:INahqihVU3WpgfEW4MuZHoEWAE5zYUoh:3M6I96lWzT
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\qwhzmlh.dll c55f09a891e4f5a810b755fb45b440da012f858d12751d46308231e5a02429ee.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 940 c55f09a891e4f5a810b755fb45b440da012f858d12751d46308231e5a02429ee.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c55f09a891e4f5a810b755fb45b440da012f858d12751d46308231e5a02429ee.exe"C:\Users\Admin\AppData\Local\Temp\c55f09a891e4f5a810b755fb45b440da012f858d12751d46308231e5a02429ee.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:940
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:584
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1020