Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20/03/2023, 19:11
Behavioral task
behavioral1
Sample
0f7685475c0912b4e9a794fa8eeff885.exe
Resource
win7-20230220-en
3 signatures
150 seconds
General
-
Target
0f7685475c0912b4e9a794fa8eeff885.exe
-
Size
23KB
-
MD5
0f7685475c0912b4e9a794fa8eeff885
-
SHA1
92ea844bbbd0331df646c3cde3d73b37863df312
-
SHA256
f41ef98c543024f81a9f443613eae6eb09de3c7a310b8794ecc9baec31999ca2
-
SHA512
2c90bf5f13cdbfd33857f1f0d214b8ee537b3fca09fdbdae727eb45db1f97a5c59f738252cceb2d31fa517b7cd25053af8c8e35fe1cdcae3161d52d50961f929
-
SSDEEP
384:X8aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZ3l:sXcwt3tRpcnuW
Score
8/10
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1164 netsh.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 2000 0f7685475c0912b4e9a794fa8eeff885.exe Token: 33 2000 0f7685475c0912b4e9a794fa8eeff885.exe Token: SeIncBasePriorityPrivilege 2000 0f7685475c0912b4e9a794fa8eeff885.exe Token: 33 2000 0f7685475c0912b4e9a794fa8eeff885.exe Token: SeIncBasePriorityPrivilege 2000 0f7685475c0912b4e9a794fa8eeff885.exe Token: 33 2000 0f7685475c0912b4e9a794fa8eeff885.exe Token: SeIncBasePriorityPrivilege 2000 0f7685475c0912b4e9a794fa8eeff885.exe Token: 33 2000 0f7685475c0912b4e9a794fa8eeff885.exe Token: SeIncBasePriorityPrivilege 2000 0f7685475c0912b4e9a794fa8eeff885.exe Token: 33 2000 0f7685475c0912b4e9a794fa8eeff885.exe Token: SeIncBasePriorityPrivilege 2000 0f7685475c0912b4e9a794fa8eeff885.exe Token: 33 2000 0f7685475c0912b4e9a794fa8eeff885.exe Token: SeIncBasePriorityPrivilege 2000 0f7685475c0912b4e9a794fa8eeff885.exe Token: 33 2000 0f7685475c0912b4e9a794fa8eeff885.exe Token: SeIncBasePriorityPrivilege 2000 0f7685475c0912b4e9a794fa8eeff885.exe Token: 33 2000 0f7685475c0912b4e9a794fa8eeff885.exe Token: SeIncBasePriorityPrivilege 2000 0f7685475c0912b4e9a794fa8eeff885.exe Token: 33 2000 0f7685475c0912b4e9a794fa8eeff885.exe Token: SeIncBasePriorityPrivilege 2000 0f7685475c0912b4e9a794fa8eeff885.exe Token: 33 2000 0f7685475c0912b4e9a794fa8eeff885.exe Token: SeIncBasePriorityPrivilege 2000 0f7685475c0912b4e9a794fa8eeff885.exe Token: 33 2000 0f7685475c0912b4e9a794fa8eeff885.exe Token: SeIncBasePriorityPrivilege 2000 0f7685475c0912b4e9a794fa8eeff885.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1164 2000 0f7685475c0912b4e9a794fa8eeff885.exe 27 PID 2000 wrote to memory of 1164 2000 0f7685475c0912b4e9a794fa8eeff885.exe 27 PID 2000 wrote to memory of 1164 2000 0f7685475c0912b4e9a794fa8eeff885.exe 27 PID 2000 wrote to memory of 1164 2000 0f7685475c0912b4e9a794fa8eeff885.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f7685475c0912b4e9a794fa8eeff885.exe"C:\Users\Admin\AppData\Local\Temp\0f7685475c0912b4e9a794fa8eeff885.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\0f7685475c0912b4e9a794fa8eeff885.exe" "0f7685475c0912b4e9a794fa8eeff885.exe" ENABLE2⤵
- Modifies Windows Firewall
PID:1164
-