Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
9193cc6cf7ad7ca2e01aaf66d3e79a5fd94d5a5d86f9a8832f14110f60b04408.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9193cc6cf7ad7ca2e01aaf66d3e79a5fd94d5a5d86f9a8832f14110f60b04408.exe
Resource
win10v2004-20230915-en
General
-
Target
9193cc6cf7ad7ca2e01aaf66d3e79a5fd94d5a5d86f9a8832f14110f60b04408.exe
-
Size
3.1MB
-
MD5
79b072cd22413ff8f32eb01feb3b6f76
-
SHA1
3d553dd755e2bcc5d8944afd7cf7233ab587edec
-
SHA256
9193cc6cf7ad7ca2e01aaf66d3e79a5fd94d5a5d86f9a8832f14110f60b04408
-
SHA512
482b881febc9ccf9f166f9af214ece1c5e15a6dd5cf4cb73e5f71dd691dbd19d104545f503560bf22cd244a0b641d2706faf86a01872517ca8e41e71d3bc56ad
-
SSDEEP
49152:BVOoCsda1C+49eaIKmdgMjC1y6wik+TJA0XX8x6eB3GuuJ:7OoLn9mdgMO1wtg3XcC
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2968-0-0x00000000002C0000-0x00000000002CB000-memory.dmp upx behavioral1/memory/2968-1-0x00000000002C0000-0x00000000002CB000-memory.dmp upx behavioral1/memory/2968-2-0x00000000002C0000-0x00000000002CB000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2968 9193cc6cf7ad7ca2e01aaf66d3e79a5fd94d5a5d86f9a8832f14110f60b04408.exe 2968 9193cc6cf7ad7ca2e01aaf66d3e79a5fd94d5a5d86f9a8832f14110f60b04408.exe 2968 9193cc6cf7ad7ca2e01aaf66d3e79a5fd94d5a5d86f9a8832f14110f60b04408.exe 2968 9193cc6cf7ad7ca2e01aaf66d3e79a5fd94d5a5d86f9a8832f14110f60b04408.exe 2968 9193cc6cf7ad7ca2e01aaf66d3e79a5fd94d5a5d86f9a8832f14110f60b04408.exe 2968 9193cc6cf7ad7ca2e01aaf66d3e79a5fd94d5a5d86f9a8832f14110f60b04408.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2968 9193cc6cf7ad7ca2e01aaf66d3e79a5fd94d5a5d86f9a8832f14110f60b04408.exe Token: SeDebugPrivilege 2968 9193cc6cf7ad7ca2e01aaf66d3e79a5fd94d5a5d86f9a8832f14110f60b04408.exe Token: SeDebugPrivilege 2968 9193cc6cf7ad7ca2e01aaf66d3e79a5fd94d5a5d86f9a8832f14110f60b04408.exe Token: SeDebugPrivilege 2968 9193cc6cf7ad7ca2e01aaf66d3e79a5fd94d5a5d86f9a8832f14110f60b04408.exe Token: SeDebugPrivilege 2968 9193cc6cf7ad7ca2e01aaf66d3e79a5fd94d5a5d86f9a8832f14110f60b04408.exe Token: SeDebugPrivilege 2968 9193cc6cf7ad7ca2e01aaf66d3e79a5fd94d5a5d86f9a8832f14110f60b04408.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2968 9193cc6cf7ad7ca2e01aaf66d3e79a5fd94d5a5d86f9a8832f14110f60b04408.exe 2968 9193cc6cf7ad7ca2e01aaf66d3e79a5fd94d5a5d86f9a8832f14110f60b04408.exe 2968 9193cc6cf7ad7ca2e01aaf66d3e79a5fd94d5a5d86f9a8832f14110f60b04408.exe 2968 9193cc6cf7ad7ca2e01aaf66d3e79a5fd94d5a5d86f9a8832f14110f60b04408.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9193cc6cf7ad7ca2e01aaf66d3e79a5fd94d5a5d86f9a8832f14110f60b04408.exe"C:\Users\Admin\AppData\Local\Temp\9193cc6cf7ad7ca2e01aaf66d3e79a5fd94d5a5d86f9a8832f14110f60b04408.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2968