Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18/07/2023, 11:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Doc-633-17-07-23.exe
Resource
win7-20230712-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
Doc-633-17-07-23.exe
Resource
win10v2004-20230703-en
5 signatures
150 seconds
General
-
Target
Doc-633-17-07-23.exe
-
Size
701KB
-
MD5
ee5b1cf5c117fc86fe1bccfec9a8cc46
-
SHA1
57b12bf0338f22d7603ff18c85c35725fc9b4f63
-
SHA256
4cd8d66fb0f643bf560702da7398ed5c27c1516ca15b7c9242f9583a162049a4
-
SHA512
59e676993bd5c66990f7a0acb64dc0882723d5b9acb3c000397391695aeea75ffe057b6630070e77a225bcad7b52248c5a234ae11223bb897730a8d1359f1033
-
SSDEEP
12288:GgERGQIut7DfWmRXtrGKXRtjxkxwm32cHO15UV7fmYiK13fJJ1:hERz7TrRXt7Xvjx4wmmuO14hiKBh
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Control Panel\International\Geo\Nation Doc-633-17-07-23.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2540 set thread context of 2380 2540 Doc-633-17-07-23.exe 32 -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2540 Doc-633-17-07-23.exe 2540 Doc-633-17-07-23.exe 2380 Doc-633-17-07-23.exe 2380 Doc-633-17-07-23.exe 2380 Doc-633-17-07-23.exe 2380 Doc-633-17-07-23.exe 2380 Doc-633-17-07-23.exe 2380 Doc-633-17-07-23.exe 2380 Doc-633-17-07-23.exe 2380 Doc-633-17-07-23.exe 2380 Doc-633-17-07-23.exe 2380 Doc-633-17-07-23.exe 2380 Doc-633-17-07-23.exe 2380 Doc-633-17-07-23.exe 2380 Doc-633-17-07-23.exe 2380 Doc-633-17-07-23.exe 2380 Doc-633-17-07-23.exe 2380 Doc-633-17-07-23.exe 2380 Doc-633-17-07-23.exe 2380 Doc-633-17-07-23.exe 2380 Doc-633-17-07-23.exe 2380 Doc-633-17-07-23.exe 2380 Doc-633-17-07-23.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2540 Doc-633-17-07-23.exe Token: SeDebugPrivilege 2380 Doc-633-17-07-23.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2908 2540 Doc-633-17-07-23.exe 30 PID 2540 wrote to memory of 2908 2540 Doc-633-17-07-23.exe 30 PID 2540 wrote to memory of 2908 2540 Doc-633-17-07-23.exe 30 PID 2540 wrote to memory of 2908 2540 Doc-633-17-07-23.exe 30 PID 2540 wrote to memory of 2864 2540 Doc-633-17-07-23.exe 31 PID 2540 wrote to memory of 2864 2540 Doc-633-17-07-23.exe 31 PID 2540 wrote to memory of 2864 2540 Doc-633-17-07-23.exe 31 PID 2540 wrote to memory of 2864 2540 Doc-633-17-07-23.exe 31 PID 2540 wrote to memory of 2380 2540 Doc-633-17-07-23.exe 32 PID 2540 wrote to memory of 2380 2540 Doc-633-17-07-23.exe 32 PID 2540 wrote to memory of 2380 2540 Doc-633-17-07-23.exe 32 PID 2540 wrote to memory of 2380 2540 Doc-633-17-07-23.exe 32 PID 2540 wrote to memory of 2380 2540 Doc-633-17-07-23.exe 32 PID 2540 wrote to memory of 2380 2540 Doc-633-17-07-23.exe 32 PID 2540 wrote to memory of 2380 2540 Doc-633-17-07-23.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Doc-633-17-07-23.exe"C:\Users\Admin\AppData\Local\Temp\Doc-633-17-07-23.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\Doc-633-17-07-23.exe"{path}"2⤵PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\Doc-633-17-07-23.exe"{path}"2⤵PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\Doc-633-17-07-23.exe"{path}"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2380
-