Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 05:20
Static task
static1
Behavioral task
behavioral1
Sample
0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe
Resource
win10v2004-20230915-en
General
-
Target
0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe
-
Size
4.5MB
-
MD5
5e0a5ca147d99774750706ed4fd2acf4
-
SHA1
18cc604553592bca88b4c9fbcf7784f1336a5259
-
SHA256
0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2
-
SHA512
2acc6282ec2dd671976d5d45d810662f9278840e7205b1d095ced32eac76fb21befac39d33be46e77aaa7f76982032460f3b86f8f17cb688beb96ab9a0ca30f0
-
SSDEEP
49152:BUpT/njU4N01Fil6aald32RvXQVjlSjSFBHVDVw6x+xz/deiN81HpCh7Q17A09NX:mWilkld32RvAj0jibq4+xz/d+Ic759Rn
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1704-9-0x0000000000960000-0x000000000099E000-memory.dmp upx behavioral1/memory/1704-11-0x0000000000960000-0x000000000099E000-memory.dmp upx behavioral1/memory/1704-16-0x0000000000960000-0x000000000099E000-memory.dmp upx behavioral1/memory/1704-20-0x0000000000960000-0x000000000099E000-memory.dmp upx behavioral1/memory/1704-18-0x0000000000960000-0x000000000099E000-memory.dmp upx behavioral1/memory/1704-14-0x0000000000960000-0x000000000099E000-memory.dmp upx behavioral1/memory/1704-10-0x0000000000960000-0x000000000099E000-memory.dmp upx behavioral1/memory/1704-23-0x0000000000960000-0x000000000099E000-memory.dmp upx behavioral1/memory/1704-27-0x0000000000960000-0x000000000099E000-memory.dmp upx behavioral1/memory/1704-25-0x0000000000960000-0x000000000099E000-memory.dmp upx behavioral1/memory/1704-8-0x0000000000960000-0x000000000099E000-memory.dmp upx behavioral1/memory/1704-32-0x0000000000960000-0x000000000099E000-memory.dmp upx behavioral1/memory/1704-35-0x0000000000960000-0x000000000099E000-memory.dmp upx behavioral1/memory/1704-30-0x0000000000960000-0x000000000099E000-memory.dmp upx behavioral1/memory/1704-42-0x0000000000960000-0x000000000099E000-memory.dmp upx behavioral1/memory/1704-46-0x0000000000960000-0x000000000099E000-memory.dmp upx behavioral1/memory/1704-50-0x0000000000960000-0x000000000099E000-memory.dmp upx behavioral1/memory/1704-55-0x0000000000960000-0x000000000099E000-memory.dmp upx behavioral1/memory/1704-58-0x0000000000960000-0x000000000099E000-memory.dmp upx behavioral1/memory/1704-53-0x0000000000960000-0x000000000099E000-memory.dmp upx behavioral1/memory/1704-48-0x0000000000960000-0x000000000099E000-memory.dmp upx behavioral1/memory/1704-44-0x0000000000960000-0x000000000099E000-memory.dmp upx behavioral1/memory/1704-40-0x0000000000960000-0x000000000099E000-memory.dmp upx behavioral1/memory/1704-38-0x0000000000960000-0x000000000099E000-memory.dmp upx behavioral1/memory/1704-59-0x0000000000960000-0x000000000099E000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: 1 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeCreateTokenPrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeAssignPrimaryTokenPrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeLockMemoryPrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeIncreaseQuotaPrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeMachineAccountPrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeTcbPrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeSecurityPrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeTakeOwnershipPrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeLoadDriverPrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeSystemProfilePrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeSystemtimePrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeProfSingleProcessPrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeIncBasePriorityPrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeCreatePagefilePrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeCreatePermanentPrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeBackupPrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeRestorePrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeShutdownPrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeDebugPrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeAuditPrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeSystemEnvironmentPrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeChangeNotifyPrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeRemoteShutdownPrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeUndockPrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeSyncAgentPrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeEnableDelegationPrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeManageVolumePrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeImpersonatePrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: SeCreateGlobalPrivilege 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: 31 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: 32 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: 33 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: 34 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: 35 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: 36 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: 37 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: 38 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: 39 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: 40 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: 41 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: 42 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: 43 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: 44 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: 45 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: 46 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: 47 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe Token: 48 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe 1704 0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe"C:\Users\Admin\AppData\Local\Temp\0e8553e4e8b4682fcb0f8c8b5515e6a16e373418fa3dcc598610c3c5bdc187d2.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1704