Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
19s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 13:16
Static task
static1
Behavioral task
behavioral1
Sample
904bb333c610be59488aa2da9711864648eb903d2631fe4a67916610fa38c349.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
904bb333c610be59488aa2da9711864648eb903d2631fe4a67916610fa38c349.exe
Resource
win10v2004-20220901-en
General
-
Target
904bb333c610be59488aa2da9711864648eb903d2631fe4a67916610fa38c349.exe
-
Size
2.3MB
-
MD5
45f72449c917b98a7b04f9d7fe802314
-
SHA1
ae8f96fde1350261e0d6915b99beee7eae98337c
-
SHA256
904bb333c610be59488aa2da9711864648eb903d2631fe4a67916610fa38c349
-
SHA512
80163718418cbd8da4936d3c59d0ab8b7d95af040886fc17111d9b41a81f1aef812fe60e64490d8f4894f7434b6ea41f8901c043ebc920fc5e0079758ca29921
-
SSDEEP
49152:uiEFCx7tqDaZmown+0c0HVpQzoJ8NyGWaaNYI3DRfv+hl:5eCx74Dawn+LSzIoyYGMNY61v+hl
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000a00000001331d-55.dat acprotect -
resource yara_rule behavioral1/files/0x000a00000001331d-55.dat upx behavioral1/memory/952-56-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/952-57-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 952 904bb333c610be59488aa2da9711864648eb903d2631fe4a67916610fa38c349.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\jedata.dll 904bb333c610be59488aa2da9711864648eb903d2631fe4a67916610fa38c349.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 952 904bb333c610be59488aa2da9711864648eb903d2631fe4a67916610fa38c349.exe Token: SeIncBasePriorityPrivilege 952 904bb333c610be59488aa2da9711864648eb903d2631fe4a67916610fa38c349.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 952 904bb333c610be59488aa2da9711864648eb903d2631fe4a67916610fa38c349.exe 952 904bb333c610be59488aa2da9711864648eb903d2631fe4a67916610fa38c349.exe 952 904bb333c610be59488aa2da9711864648eb903d2631fe4a67916610fa38c349.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\904bb333c610be59488aa2da9711864648eb903d2631fe4a67916610fa38c349.exe"C:\Users\Admin\AppData\Local\Temp\904bb333c610be59488aa2da9711864648eb903d2631fe4a67916610fa38c349.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:952
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD5114054313070472cd1a6d7d28f7c5002
SHA19a044986e6101df1a126035da7326a50c3fe9a23
SHA256e15d9e1b772fed3db19e67b8d54533d1a2d46a37f8b12702a5892c6b886e9db1
SHA512a2ff8481e89698dae4a1c83404105093472e384d7a3debbd7014e010543e08efc8ebb3f67c8a4ce09029e6b2a8fb7779bb402aae7c9987e61389cd8a72c73522