Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 13:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Shipping Documents 80053164992.exe
Resource
win7-20231023-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
Shipping Documents 80053164992.exe
Resource
win10v2004-20231025-en
3 signatures
150 seconds
General
-
Target
Shipping Documents 80053164992.exe
-
Size
953KB
-
MD5
118090ee776424c6ff08ec26a98cb134
-
SHA1
c76d5ace2a5c080c20dc43122f636088af8eaba1
-
SHA256
f2ef4aecdf3304be6f7f7b729eea019ae8af63befc4c0736e71c722c169e3eab
-
SHA512
df561a729b5cbbc383ebc653f217721ac514df21be81eae139e4b32ef5832132c62b343efa37fe08dc68ad8d81cd81564d29e4cbc0315e14109200bf13bff93c
-
SSDEEP
24576:T5EACio/gqFU/OOq7r0iMGXwkvW8/ZozW+Q:g/4/tqD1gIWOZoa+
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3732 Shipping Documents 80053164992.exe 3732 Shipping Documents 80053164992.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3732 Shipping Documents 80053164992.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3732 wrote to memory of 3872 3732 Shipping Documents 80053164992.exe 90 PID 3732 wrote to memory of 3872 3732 Shipping Documents 80053164992.exe 90 PID 3732 wrote to memory of 3872 3732 Shipping Documents 80053164992.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Shipping Documents 80053164992.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents 80053164992.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\Shipping Documents 80053164992.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents 80053164992.exe"2⤵PID:3872
-