Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/07/2023, 11:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Doc-633-17-07-23.exe
Resource
win7-20230712-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
Doc-633-17-07-23.exe
Resource
win10v2004-20230703-en
5 signatures
150 seconds
General
-
Target
Doc-633-17-07-23.exe
-
Size
701KB
-
MD5
ee5b1cf5c117fc86fe1bccfec9a8cc46
-
SHA1
57b12bf0338f22d7603ff18c85c35725fc9b4f63
-
SHA256
4cd8d66fb0f643bf560702da7398ed5c27c1516ca15b7c9242f9583a162049a4
-
SHA512
59e676993bd5c66990f7a0acb64dc0882723d5b9acb3c000397391695aeea75ffe057b6630070e77a225bcad7b52248c5a234ae11223bb897730a8d1359f1033
-
SSDEEP
12288:GgERGQIut7DfWmRXtrGKXRtjxkxwm32cHO15UV7fmYiK13fJJ1:hERz7TrRXt7Xvjx4wmmuO14hiKBh
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Control Panel\International\Geo\Nation Doc-633-17-07-23.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4072 set thread context of 804 4072 Doc-633-17-07-23.exe 98 -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 4072 Doc-633-17-07-23.exe 4072 Doc-633-17-07-23.exe 4072 Doc-633-17-07-23.exe 4072 Doc-633-17-07-23.exe 4072 Doc-633-17-07-23.exe 4072 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe 804 Doc-633-17-07-23.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4072 Doc-633-17-07-23.exe Token: SeDebugPrivilege 804 Doc-633-17-07-23.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4072 wrote to memory of 3768 4072 Doc-633-17-07-23.exe 95 PID 4072 wrote to memory of 3768 4072 Doc-633-17-07-23.exe 95 PID 4072 wrote to memory of 3768 4072 Doc-633-17-07-23.exe 95 PID 4072 wrote to memory of 4180 4072 Doc-633-17-07-23.exe 96 PID 4072 wrote to memory of 4180 4072 Doc-633-17-07-23.exe 96 PID 4072 wrote to memory of 4180 4072 Doc-633-17-07-23.exe 96 PID 4072 wrote to memory of 1616 4072 Doc-633-17-07-23.exe 97 PID 4072 wrote to memory of 1616 4072 Doc-633-17-07-23.exe 97 PID 4072 wrote to memory of 1616 4072 Doc-633-17-07-23.exe 97 PID 4072 wrote to memory of 804 4072 Doc-633-17-07-23.exe 98 PID 4072 wrote to memory of 804 4072 Doc-633-17-07-23.exe 98 PID 4072 wrote to memory of 804 4072 Doc-633-17-07-23.exe 98 PID 4072 wrote to memory of 804 4072 Doc-633-17-07-23.exe 98 PID 4072 wrote to memory of 804 4072 Doc-633-17-07-23.exe 98 PID 4072 wrote to memory of 804 4072 Doc-633-17-07-23.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\Doc-633-17-07-23.exe"C:\Users\Admin\AppData\Local\Temp\Doc-633-17-07-23.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\Doc-633-17-07-23.exe"{path}"2⤵PID:3768
-
-
C:\Users\Admin\AppData\Local\Temp\Doc-633-17-07-23.exe"{path}"2⤵PID:4180
-
-
C:\Users\Admin\AppData\Local\Temp\Doc-633-17-07-23.exe"{path}"2⤵PID:1616
-
-
C:\Users\Admin\AppData\Local\Temp\Doc-633-17-07-23.exe"{path}"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:804
-