Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01/09/2023, 04:36
Behavioral task
behavioral1
Sample
43b9893814355338853035600de91b96e913d8c7a9df077313c0ec2251d1419f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
43b9893814355338853035600de91b96e913d8c7a9df077313c0ec2251d1419f.exe
Resource
win10v2004-20230831-en
General
-
Target
43b9893814355338853035600de91b96e913d8c7a9df077313c0ec2251d1419f.exe
-
Size
1.5MB
-
MD5
c05787b6f654ddea04c41fa003745a34
-
SHA1
7103a2f335a1725f386134e8df5f255bf679bdbd
-
SHA256
43b9893814355338853035600de91b96e913d8c7a9df077313c0ec2251d1419f
-
SHA512
1b8341e7e60e04eed550bfa043e33b4907091c505d57b13cdd1c2020f0fb27492251a1dd9147981df0f5184eafe90690262fb35078130e8a94c4d3521779367f
-
SSDEEP
24576:UFr/cLb0znMpVrHVl9TkoAAFL5aG3FoyWgNqAMfqw7nls0WyHW3slFUn4x:UBcinMPVPjAAUYPIAMbJsPyHKv
Malware Config
Signatures
-
Kills process with taskkill 2 IoCs
pid Process 2388 taskkill.exe 1756 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1756 taskkill.exe Token: SeDebugPrivilege 2388 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1300 43b9893814355338853035600de91b96e913d8c7a9df077313c0ec2251d1419f.exe 1300 43b9893814355338853035600de91b96e913d8c7a9df077313c0ec2251d1419f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1300 wrote to memory of 2388 1300 43b9893814355338853035600de91b96e913d8c7a9df077313c0ec2251d1419f.exe 28 PID 1300 wrote to memory of 2388 1300 43b9893814355338853035600de91b96e913d8c7a9df077313c0ec2251d1419f.exe 28 PID 1300 wrote to memory of 2388 1300 43b9893814355338853035600de91b96e913d8c7a9df077313c0ec2251d1419f.exe 28 PID 1300 wrote to memory of 2388 1300 43b9893814355338853035600de91b96e913d8c7a9df077313c0ec2251d1419f.exe 28 PID 1300 wrote to memory of 1756 1300 43b9893814355338853035600de91b96e913d8c7a9df077313c0ec2251d1419f.exe 29 PID 1300 wrote to memory of 1756 1300 43b9893814355338853035600de91b96e913d8c7a9df077313c0ec2251d1419f.exe 29 PID 1300 wrote to memory of 1756 1300 43b9893814355338853035600de91b96e913d8c7a9df077313c0ec2251d1419f.exe 29 PID 1300 wrote to memory of 1756 1300 43b9893814355338853035600de91b96e913d8c7a9df077313c0ec2251d1419f.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\43b9893814355338853035600de91b96e913d8c7a9df077313c0ec2251d1419f.exe"C:\Users\Admin\AppData\Local\Temp\43b9893814355338853035600de91b96e913d8c7a9df077313c0ec2251d1419f.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im winrshost.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im winrshost.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1756
-