Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
18/09/2023, 02:12
Static task
static1
Behavioral task
behavioral1
Sample
847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe
Resource
win10v2004-20230915-en
General
-
Target
847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe
-
Size
10.9MB
-
MD5
2f9b8be36acfd90d062e8da740dd4ade
-
SHA1
296383ac7f15ca9634bc8601771e37a3e58d5d0e
-
SHA256
847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a
-
SHA512
99708ed147716b5182e9a01beb1099a608f1fc844374c24d88bb55df6bd74694030e2ca85c525d2363e80d0caa1a3c13a80b4113d278299f6a5ac03082038877
-
SSDEEP
196608:itTZnGHQiasv77LLZOmYgGcEw3Xt51Aitzmg/ZI7phR:KsQiasvvLNOmYg3r3d51AyzmkiFn
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 5 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0028000000015c92-8.dat acprotect behavioral1/files/0x000a000000015ec6-11.dat acprotect behavioral1/files/0x0007000000015eb2-13.dat acprotect behavioral1/files/0x0007000000015e3d-15.dat acprotect behavioral1/files/0x0009000000016059-17.dat acprotect -
Loads dropped DLL 6 IoCs
pid Process 1984 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe 1984 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe 1984 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe 1984 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe 1984 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe 1984 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe -
resource yara_rule behavioral1/files/0x0028000000015c92-8.dat upx behavioral1/files/0x000a000000015ec6-11.dat upx behavioral1/files/0x0007000000015eb2-13.dat upx behavioral1/files/0x0007000000015e3d-15.dat upx behavioral1/files/0x0009000000016059-17.dat upx behavioral1/memory/1984-20-0x000000006F600000-0x000000006F70B000-memory.dmp upx behavioral1/memory/1984-19-0x00000000747E0000-0x0000000074F14000-memory.dmp upx behavioral1/memory/1984-21-0x000000006CEC0000-0x000000006CF39000-memory.dmp upx behavioral1/memory/1984-22-0x0000000000280000-0x00000000002D8000-memory.dmp upx behavioral1/memory/1984-23-0x000000006D7C0000-0x000000006EAD0000-memory.dmp upx behavioral1/memory/1984-27-0x000000006CEC0000-0x000000006CF39000-memory.dmp upx behavioral1/memory/1984-26-0x000000006F600000-0x000000006F70B000-memory.dmp upx behavioral1/memory/1984-25-0x000000006D7C0000-0x000000006EAD0000-memory.dmp upx behavioral1/memory/1984-28-0x0000000000280000-0x00000000002D8000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeLockMemoryPrivilege 1984 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe Token: SeLockMemoryPrivilege 1984 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe Token: SeLockMemoryPrivilege 1984 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe Token: SeLockMemoryPrivilege 1984 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe Token: SeLockMemoryPrivilege 1984 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe Token: SeLockMemoryPrivilege 1984 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe Token: SeLockMemoryPrivilege 1984 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1984 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe 1984 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe 1984 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe"C:\Users\Admin\AppData\Local\Temp\847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1984
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.7MB
MD5a474404b5bb6bb2e862302691fdbc6a9
SHA1a7cbea26dfab4e47793d819fe77e0c722b698dce
SHA25676269894668b55fdc052884ed9a5e4f1dfdb6c560cbbae750b2126dedfff0345
SHA512caabe657d987329e2c2f1dabe4e334f56f5110d88f5093033172b949418fab6b3a5d52b497389d1c2aa9393ba2614f3343c80dfe14516051739833cb7bdfafab
-
Filesize
1.5MB
MD5ad025d607c79bfe1635136b2e879886a
SHA1136bed91251f38ab9607028b13b929b2b6eb9306
SHA25658f92e5df2db5cd4be6bff3b5a2bab139927a475d864974ab84a120685b31c50
SHA51208221ceafa411305d03405db0eb9cd76c477629124b25182daa20b36975fe6a14e49db5bb604b93ced717c75d1a0f070a997869f97b3b08932278cac98209fc7
-
Filesize
189KB
MD5704370d7ce3cea4809b267d165c103a3
SHA1dafd91f8a60f3dc67db13b406a60f60d57807458
SHA25638c0d0d2588673d19cd43cc784c6d96e60c7bd53372ccf418c47b495e04c166e
SHA512083aeb1bd044c413466b24527ec1aacc99811e151c2c04f7a6726e58f7c91990e0ed10043f3c6896f37e559ba3e824eff82d4ef35487e7c9018d8dfbbd665da6
-
Filesize
254KB
MD56b82dbdf29f34ab683c7525ea316f6fd
SHA1f7232170d14ac3a6544540f7070b824ef6cd354e
SHA256711552fc86675a863463fed2f75051c1d90f447e0d59e131b08b48e288c3ec09
SHA512d21a112ad3d757e96fb49491cc11c09f9ea472ebc5af9e3b0561fec363acb1995eb2d040f6d6bf940bb6fd601b15f271332f8d719583458432f67ed264c406d9
-
Filesize
5.1MB
MD5b159bba22ed8faee5160ea3e22915dfe
SHA15bc9f90499946050cb560e1d8269ec8ac39dc46c
SHA2563f1eac898b79aed797b8648c6cbf3371ea5525db64fb830bf1fc4da1454eed92
SHA512cef9452f84fe1e30b478e3dfd50fc936ed1aae58e245770b7d3a31dc5ac6f52d54c1c55d61307b64f52efb798da8dcd5246de3cf31281035f72e64a19321f731
-
Filesize
129KB
MD55814d46195be3983e963e13a91657e7a
SHA1ebbfe9956111522918ce7b9f6bd80a3cb79bc330
SHA2568de1e1aeec7490e7ff4a7f8f7617ed6b166e55f694d79aced37c7634b6da4cd9
SHA51299d9c14fefd32d7a665adc2824bf600e43b6a572f27dc88ffb487bb3ac049309cf2b04279f2b3a63290f567a47e99bf6f25db0bda96c1ec80241ceb3fa22cb1d