Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
50s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 21:22
Static task
static1
Behavioral task
behavioral1
Sample
a1deb506f5442e215a6983c89368bd53068a0458ded4a5ba5d6febdcce2d39ca.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a1deb506f5442e215a6983c89368bd53068a0458ded4a5ba5d6febdcce2d39ca.exe
Resource
win10v2004-20221111-en
General
-
Target
a1deb506f5442e215a6983c89368bd53068a0458ded4a5ba5d6febdcce2d39ca.exe
-
Size
54KB
-
MD5
ff348a652d18131a0ebc7437ca24d16f
-
SHA1
e428352f842ade6df04c7a554a37a2a6d71ca078
-
SHA256
a1deb506f5442e215a6983c89368bd53068a0458ded4a5ba5d6febdcce2d39ca
-
SHA512
9f78683fa8284c6ca5e2bc02605af541e086b86c33b80bb2eaabc3e8ab3a932d2bf730eb97232f42d64acac7c116ae7440a3957bd4c4ffb735ec829665461280
-
SSDEEP
1536:Xd1gwjrLJdkfutefTCbVyEBKp4OLeXINExz31m:Xd+41QuteLE8Te4N0lm
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Ir32_a.exe a1deb506f5442e215a6983c89368bd53068a0458ded4a5ba5d6febdcce2d39ca.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1808 a1deb506f5442e215a6983c89368bd53068a0458ded4a5ba5d6febdcce2d39ca.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1808 a1deb506f5442e215a6983c89368bd53068a0458ded4a5ba5d6febdcce2d39ca.exe Token: SeSystemtimePrivilege 1808 a1deb506f5442e215a6983c89368bd53068a0458ded4a5ba5d6febdcce2d39ca.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 1808 wrote to memory of 1288 1808 a1deb506f5442e215a6983c89368bd53068a0458ded4a5ba5d6febdcce2d39ca.exe 17
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\a1deb506f5442e215a6983c89368bd53068a0458ded4a5ba5d6febdcce2d39ca.exe"C:\Users\Admin\AppData\Local\Temp\a1deb506f5442e215a6983c89368bd53068a0458ded4a5ba5d6febdcce2d39ca.exe"2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1808
-