Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/06/2023, 22:23
Behavioral task
behavioral1
Sample
b7dbdae666095355c2b1737459f7b8df.exe
Resource
win7-20230220-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
b7dbdae666095355c2b1737459f7b8df.exe
Resource
win10v2004-20230220-en
5 signatures
150 seconds
General
-
Target
b7dbdae666095355c2b1737459f7b8df.exe
-
Size
93KB
-
MD5
b7dbdae666095355c2b1737459f7b8df
-
SHA1
f0b46ba9cc1d1c262ebc1ee65cc15273eb6c4226
-
SHA256
b640ee680aedb79ac683a15f29e96b866ac4994171f3ec7aa0dacf75499efa7a
-
SHA512
c8281807c050dd442157e73d2a105c86973aeff4728f4dc7d407325e00690399dbae69024fcc5991e6add0490e2df07584ace6c4ebd16696da24352c55a41dbd
-
SSDEEP
1536:JUk1GkeUqZJO5iNSimjEwzGi1dDADQgS:JUPUqZJOQAOi1dG5
Score
8/10
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1292 netsh.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1324 b7dbdae666095355c2b1737459f7b8df.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 1324 b7dbdae666095355c2b1737459f7b8df.exe Token: 33 1324 b7dbdae666095355c2b1737459f7b8df.exe Token: SeIncBasePriorityPrivilege 1324 b7dbdae666095355c2b1737459f7b8df.exe Token: 33 1324 b7dbdae666095355c2b1737459f7b8df.exe Token: SeIncBasePriorityPrivilege 1324 b7dbdae666095355c2b1737459f7b8df.exe Token: 33 1324 b7dbdae666095355c2b1737459f7b8df.exe Token: SeIncBasePriorityPrivilege 1324 b7dbdae666095355c2b1737459f7b8df.exe Token: 33 1324 b7dbdae666095355c2b1737459f7b8df.exe Token: SeIncBasePriorityPrivilege 1324 b7dbdae666095355c2b1737459f7b8df.exe Token: 33 1324 b7dbdae666095355c2b1737459f7b8df.exe Token: SeIncBasePriorityPrivilege 1324 b7dbdae666095355c2b1737459f7b8df.exe Token: 33 1324 b7dbdae666095355c2b1737459f7b8df.exe Token: SeIncBasePriorityPrivilege 1324 b7dbdae666095355c2b1737459f7b8df.exe Token: 33 1324 b7dbdae666095355c2b1737459f7b8df.exe Token: SeIncBasePriorityPrivilege 1324 b7dbdae666095355c2b1737459f7b8df.exe Token: 33 1324 b7dbdae666095355c2b1737459f7b8df.exe Token: SeIncBasePriorityPrivilege 1324 b7dbdae666095355c2b1737459f7b8df.exe Token: 33 1324 b7dbdae666095355c2b1737459f7b8df.exe Token: SeIncBasePriorityPrivilege 1324 b7dbdae666095355c2b1737459f7b8df.exe Token: 33 1324 b7dbdae666095355c2b1737459f7b8df.exe Token: SeIncBasePriorityPrivilege 1324 b7dbdae666095355c2b1737459f7b8df.exe Token: 33 1324 b7dbdae666095355c2b1737459f7b8df.exe Token: SeIncBasePriorityPrivilege 1324 b7dbdae666095355c2b1737459f7b8df.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1324 wrote to memory of 1292 1324 b7dbdae666095355c2b1737459f7b8df.exe 28 PID 1324 wrote to memory of 1292 1324 b7dbdae666095355c2b1737459f7b8df.exe 28 PID 1324 wrote to memory of 1292 1324 b7dbdae666095355c2b1737459f7b8df.exe 28 PID 1324 wrote to memory of 1292 1324 b7dbdae666095355c2b1737459f7b8df.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7dbdae666095355c2b1737459f7b8df.exe"C:\Users\Admin\AppData\Local\Temp\b7dbdae666095355c2b1737459f7b8df.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\b7dbdae666095355c2b1737459f7b8df.exe" "b7dbdae666095355c2b1737459f7b8df.exe" ENABLE2⤵
- Modifies Windows Firewall
PID:1292
-