Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2023, 20:32
Static task
static1
Behavioral task
behavioral1
Sample
8adc1dff793a76a3782ed91fd9ff9f2b511addc67973d93a4ab02a99c32a4496.exe
Resource
win10v2004-20220812-en
4 signatures
150 seconds
General
-
Target
8adc1dff793a76a3782ed91fd9ff9f2b511addc67973d93a4ab02a99c32a4496.exe
-
Size
1.5MB
-
MD5
785c62b913918df9de24adb49703e702
-
SHA1
3f5f0622d6aa80db0996ccc2028c6fa475a857f6
-
SHA256
8adc1dff793a76a3782ed91fd9ff9f2b511addc67973d93a4ab02a99c32a4496
-
SHA512
c82385aa92362873019c3d1b3bc602699886d944fd19cd961d47da82f259ccef2ac57675f23f2f26636643d26d973b5cd23501eda05e6aa103bdaa919bcbce81
-
SSDEEP
12288:3p7/rp2i+rg2b0gE/nRki7S1VOBt8NEo/MHLsnd6MJV9XKAmgOrrJelIEifzGfFi:FrT2Y1njWwKNEo/Z7r9aAq3Je6PCf3U
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3416 1232 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1536 powershell.exe 1536 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1232 8adc1dff793a76a3782ed91fd9ff9f2b511addc67973d93a4ab02a99c32a4496.exe Token: SeDebugPrivilege 1536 powershell.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1232 wrote to memory of 1536 1232 8adc1dff793a76a3782ed91fd9ff9f2b511addc67973d93a4ab02a99c32a4496.exe 83 PID 1232 wrote to memory of 1536 1232 8adc1dff793a76a3782ed91fd9ff9f2b511addc67973d93a4ab02a99c32a4496.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\8adc1dff793a76a3782ed91fd9ff9f2b511addc67973d93a4ab02a99c32a4496.exe"C:\Users\Admin\AppData\Local\Temp\8adc1dff793a76a3782ed91fd9ff9f2b511addc67973d93a4ab02a99c32a4496.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1232 -s 9682⤵
- Program crash
PID:3416
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 416 -p 1232 -ip 12321⤵PID:3192