Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2023, 01:39
Static task
static1
Behavioral task
behavioral1
Sample
efb834b38792a7c5f000b0683aa6fb5999fd2c0d6dfda9ba417f990fbe1041b5.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
efb834b38792a7c5f000b0683aa6fb5999fd2c0d6dfda9ba417f990fbe1041b5.exe
Resource
win10v2004-20230915-en
General
-
Target
efb834b38792a7c5f000b0683aa6fb5999fd2c0d6dfda9ba417f990fbe1041b5.exe
-
Size
596KB
-
MD5
61e7842d593f985b71dcb89b1d12a097
-
SHA1
d73c1b338469a5d5125de231f2b09c7c44c73a66
-
SHA256
efb834b38792a7c5f000b0683aa6fb5999fd2c0d6dfda9ba417f990fbe1041b5
-
SHA512
46a5f24354530ae356e5499389856b25d2a42ad696b8fe39c94d1b0bc2aeff11934906d5deb6cb994241b54f4ca83c86c2e28cd80108e44bee3b97b3e8a0a40d
-
SSDEEP
12288:zMYnQ3j67SESV1eXl8OhA905Na+U/IVEbGU3kD5qekn2w49xq2D/ERzAnwjiB2I:zB5Na+3V6DkseC2w49lD/E9n3I
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4152 set thread context of 3704 4152 efb834b38792a7c5f000b0683aa6fb5999fd2c0d6dfda9ba417f990fbe1041b5.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3704 efb834b38792a7c5f000b0683aa6fb5999fd2c0d6dfda9ba417f990fbe1041b5.exe 3704 efb834b38792a7c5f000b0683aa6fb5999fd2c0d6dfda9ba417f990fbe1041b5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4152 efb834b38792a7c5f000b0683aa6fb5999fd2c0d6dfda9ba417f990fbe1041b5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4152 wrote to memory of 3704 4152 efb834b38792a7c5f000b0683aa6fb5999fd2c0d6dfda9ba417f990fbe1041b5.exe 84 PID 4152 wrote to memory of 3704 4152 efb834b38792a7c5f000b0683aa6fb5999fd2c0d6dfda9ba417f990fbe1041b5.exe 84 PID 4152 wrote to memory of 3704 4152 efb834b38792a7c5f000b0683aa6fb5999fd2c0d6dfda9ba417f990fbe1041b5.exe 84 PID 4152 wrote to memory of 3704 4152 efb834b38792a7c5f000b0683aa6fb5999fd2c0d6dfda9ba417f990fbe1041b5.exe 84 PID 4152 wrote to memory of 3704 4152 efb834b38792a7c5f000b0683aa6fb5999fd2c0d6dfda9ba417f990fbe1041b5.exe 84 PID 4152 wrote to memory of 3704 4152 efb834b38792a7c5f000b0683aa6fb5999fd2c0d6dfda9ba417f990fbe1041b5.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\efb834b38792a7c5f000b0683aa6fb5999fd2c0d6dfda9ba417f990fbe1041b5.exe"C:\Users\Admin\AppData\Local\Temp\efb834b38792a7c5f000b0683aa6fb5999fd2c0d6dfda9ba417f990fbe1041b5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\efb834b38792a7c5f000b0683aa6fb5999fd2c0d6dfda9ba417f990fbe1041b5.exe"C:\Users\Admin\AppData\Local\Temp\efb834b38792a7c5f000b0683aa6fb5999fd2c0d6dfda9ba417f990fbe1041b5.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3704
-