Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2023, 02:12
Static task
static1
Behavioral task
behavioral1
Sample
847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe
Resource
win10v2004-20230915-en
General
-
Target
847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe
-
Size
10.9MB
-
MD5
2f9b8be36acfd90d062e8da740dd4ade
-
SHA1
296383ac7f15ca9634bc8601771e37a3e58d5d0e
-
SHA256
847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a
-
SHA512
99708ed147716b5182e9a01beb1099a608f1fc844374c24d88bb55df6bd74694030e2ca85c525d2363e80d0caa1a3c13a80b4113d278299f6a5ac03082038877
-
SSDEEP
196608:itTZnGHQiasv77LLZOmYgGcEw3Xt51Aitzmg/ZI7phR:KsQiasvvLNOmYg3r3d51AyzmkiFn
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 6 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00070000000231d8-9.dat acprotect behavioral2/files/0x00070000000231db-12.dat acprotect behavioral2/files/0x00070000000231da-14.dat acprotect behavioral2/files/0x00070000000231d9-20.dat acprotect behavioral2/files/0x00080000000231cc-18.dat acprotect behavioral2/files/0x00070000000231d9-16.dat acprotect -
Loads dropped DLL 7 IoCs
pid Process 2236 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe 2236 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe 2236 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe 2236 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe 2236 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe 2236 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe 2236 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe -
resource yara_rule behavioral2/files/0x00070000000231d8-9.dat upx behavioral2/files/0x00070000000231db-12.dat upx behavioral2/files/0x00070000000231da-14.dat upx behavioral2/files/0x00070000000231d9-20.dat upx behavioral2/memory/2236-28-0x000000006F600000-0x000000006F70B000-memory.dmp upx behavioral2/memory/2236-29-0x0000000002EE0000-0x0000000002F59000-memory.dmp upx behavioral2/memory/2236-27-0x00000000746E0000-0x0000000074E14000-memory.dmp upx behavioral2/files/0x00080000000231cc-18.dat upx behavioral2/files/0x00070000000231d9-16.dat upx behavioral2/memory/2236-30-0x000000006CF00000-0x000000006CF58000-memory.dmp upx behavioral2/memory/2236-31-0x000000006D7C0000-0x000000006EAD0000-memory.dmp upx behavioral2/memory/2236-33-0x000000006D7C0000-0x000000006EAD0000-memory.dmp upx behavioral2/memory/2236-34-0x000000006F600000-0x000000006F70B000-memory.dmp upx behavioral2/memory/2236-35-0x000000006CF00000-0x000000006CF58000-memory.dmp upx behavioral2/memory/2236-36-0x0000000002EE0000-0x0000000002F59000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeLockMemoryPrivilege 2236 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe Token: SeLockMemoryPrivilege 2236 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe Token: SeLockMemoryPrivilege 2236 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe Token: SeLockMemoryPrivilege 2236 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe Token: SeLockMemoryPrivilege 2236 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe Token: SeLockMemoryPrivilege 2236 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe Token: SeLockMemoryPrivilege 2236 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2236 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe 2236 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe 2236 847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe"C:\Users\Admin\AppData\Local\Temp\847a5010dabd34e42d4155e48c64606790e4a6551107a321550bfcbfa6d8e07a.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2236
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.7MB
MD5a474404b5bb6bb2e862302691fdbc6a9
SHA1a7cbea26dfab4e47793d819fe77e0c722b698dce
SHA25676269894668b55fdc052884ed9a5e4f1dfdb6c560cbbae750b2126dedfff0345
SHA512caabe657d987329e2c2f1dabe4e334f56f5110d88f5093033172b949418fab6b3a5d52b497389d1c2aa9393ba2614f3343c80dfe14516051739833cb7bdfafab
-
Filesize
1.5MB
MD5ad025d607c79bfe1635136b2e879886a
SHA1136bed91251f38ab9607028b13b929b2b6eb9306
SHA25658f92e5df2db5cd4be6bff3b5a2bab139927a475d864974ab84a120685b31c50
SHA51208221ceafa411305d03405db0eb9cd76c477629124b25182daa20b36975fe6a14e49db5bb604b93ced717c75d1a0f070a997869f97b3b08932278cac98209fc7
-
Filesize
189KB
MD5704370d7ce3cea4809b267d165c103a3
SHA1dafd91f8a60f3dc67db13b406a60f60d57807458
SHA25638c0d0d2588673d19cd43cc784c6d96e60c7bd53372ccf418c47b495e04c166e
SHA512083aeb1bd044c413466b24527ec1aacc99811e151c2c04f7a6726e58f7c91990e0ed10043f3c6896f37e559ba3e824eff82d4ef35487e7c9018d8dfbbd665da6
-
Filesize
189KB
MD5704370d7ce3cea4809b267d165c103a3
SHA1dafd91f8a60f3dc67db13b406a60f60d57807458
SHA25638c0d0d2588673d19cd43cc784c6d96e60c7bd53372ccf418c47b495e04c166e
SHA512083aeb1bd044c413466b24527ec1aacc99811e151c2c04f7a6726e58f7c91990e0ed10043f3c6896f37e559ba3e824eff82d4ef35487e7c9018d8dfbbd665da6
-
Filesize
254KB
MD56b82dbdf29f34ab683c7525ea316f6fd
SHA1f7232170d14ac3a6544540f7070b824ef6cd354e
SHA256711552fc86675a863463fed2f75051c1d90f447e0d59e131b08b48e288c3ec09
SHA512d21a112ad3d757e96fb49491cc11c09f9ea472ebc5af9e3b0561fec363acb1995eb2d040f6d6bf940bb6fd601b15f271332f8d719583458432f67ed264c406d9
-
Filesize
5.1MB
MD5b159bba22ed8faee5160ea3e22915dfe
SHA15bc9f90499946050cb560e1d8269ec8ac39dc46c
SHA2563f1eac898b79aed797b8648c6cbf3371ea5525db64fb830bf1fc4da1454eed92
SHA512cef9452f84fe1e30b478e3dfd50fc936ed1aae58e245770b7d3a31dc5ac6f52d54c1c55d61307b64f52efb798da8dcd5246de3cf31281035f72e64a19321f731
-
Filesize
129KB
MD55814d46195be3983e963e13a91657e7a
SHA1ebbfe9956111522918ce7b9f6bd80a3cb79bc330
SHA2568de1e1aeec7490e7ff4a7f8f7617ed6b166e55f694d79aced37c7634b6da4cd9
SHA51299d9c14fefd32d7a665adc2824bf600e43b6a572f27dc88ffb487bb3ac049309cf2b04279f2b3a63290f567a47e99bf6f25db0bda96c1ec80241ceb3fa22cb1d