Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
10s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 23:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
193133d49cd9ff3ff0b5053020891cf8.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
193133d49cd9ff3ff0b5053020891cf8.exe
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
193133d49cd9ff3ff0b5053020891cf8.exe
-
Size
71KB
-
MD5
193133d49cd9ff3ff0b5053020891cf8
-
SHA1
9041e1fafae25bde3eb99e33c932660b9e05b2d8
-
SHA256
8bfe79a29d8b0d7dbdfacd0c0e0becae863a1e7fe4aab15176f56a5dda727d14
-
SHA512
6c120d6c11cf7556db1c83428f02f498b1c1c93cf6bff49c75bb0a71dd6f4e469a2adcbab83ca1e01dff10ede271e555799e84ccacd53c4640f05723f64cc304
-
SSDEEP
1536:u3qRLK2Q0hUEUUeU16dE+bU8VzmudMYbwjUt/BkBp5:TLPT2U/1I0ud9UjUlBk
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2144 193133d49cd9ff3ff0b5053020891cf8.exe -
Suspicious behavior: MapViewOfSection 21 IoCs
pid Process 2144 193133d49cd9ff3ff0b5053020891cf8.exe 2144 193133d49cd9ff3ff0b5053020891cf8.exe 2144 193133d49cd9ff3ff0b5053020891cf8.exe 2144 193133d49cd9ff3ff0b5053020891cf8.exe 2144 193133d49cd9ff3ff0b5053020891cf8.exe 2144 193133d49cd9ff3ff0b5053020891cf8.exe 2144 193133d49cd9ff3ff0b5053020891cf8.exe 2144 193133d49cd9ff3ff0b5053020891cf8.exe 2144 193133d49cd9ff3ff0b5053020891cf8.exe 2144 193133d49cd9ff3ff0b5053020891cf8.exe 2144 193133d49cd9ff3ff0b5053020891cf8.exe 2144 193133d49cd9ff3ff0b5053020891cf8.exe 2144 193133d49cd9ff3ff0b5053020891cf8.exe 2144 193133d49cd9ff3ff0b5053020891cf8.exe 2144 193133d49cd9ff3ff0b5053020891cf8.exe 2144 193133d49cd9ff3ff0b5053020891cf8.exe 2144 193133d49cd9ff3ff0b5053020891cf8.exe 2144 193133d49cd9ff3ff0b5053020891cf8.exe 2144 193133d49cd9ff3ff0b5053020891cf8.exe 2144 193133d49cd9ff3ff0b5053020891cf8.exe 2144 193133d49cd9ff3ff0b5053020891cf8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2144 193133d49cd9ff3ff0b5053020891cf8.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2144 wrote to memory of 372 2144 193133d49cd9ff3ff0b5053020891cf8.exe 25 PID 2144 wrote to memory of 372 2144 193133d49cd9ff3ff0b5053020891cf8.exe 25 PID 2144 wrote to memory of 372 2144 193133d49cd9ff3ff0b5053020891cf8.exe 25 PID 2144 wrote to memory of 372 2144 193133d49cd9ff3ff0b5053020891cf8.exe 25 PID 2144 wrote to memory of 372 2144 193133d49cd9ff3ff0b5053020891cf8.exe 25 PID 2144 wrote to memory of 372 2144 193133d49cd9ff3ff0b5053020891cf8.exe 25 PID 2144 wrote to memory of 372 2144 193133d49cd9ff3ff0b5053020891cf8.exe 25 PID 2144 wrote to memory of 384 2144 193133d49cd9ff3ff0b5053020891cf8.exe 24 PID 2144 wrote to memory of 384 2144 193133d49cd9ff3ff0b5053020891cf8.exe 24 PID 2144 wrote to memory of 384 2144 193133d49cd9ff3ff0b5053020891cf8.exe 24 PID 2144 wrote to memory of 384 2144 193133d49cd9ff3ff0b5053020891cf8.exe 24 PID 2144 wrote to memory of 384 2144 193133d49cd9ff3ff0b5053020891cf8.exe 24 PID 2144 wrote to memory of 384 2144 193133d49cd9ff3ff0b5053020891cf8.exe 24 PID 2144 wrote to memory of 384 2144 193133d49cd9ff3ff0b5053020891cf8.exe 24 PID 2144 wrote to memory of 420 2144 193133d49cd9ff3ff0b5053020891cf8.exe 23 PID 2144 wrote to memory of 420 2144 193133d49cd9ff3ff0b5053020891cf8.exe 23 PID 2144 wrote to memory of 420 2144 193133d49cd9ff3ff0b5053020891cf8.exe 23 PID 2144 wrote to memory of 420 2144 193133d49cd9ff3ff0b5053020891cf8.exe 23 PID 2144 wrote to memory of 420 2144 193133d49cd9ff3ff0b5053020891cf8.exe 23 PID 2144 wrote to memory of 420 2144 193133d49cd9ff3ff0b5053020891cf8.exe 23 PID 2144 wrote to memory of 420 2144 193133d49cd9ff3ff0b5053020891cf8.exe 23 PID 2144 wrote to memory of 464 2144 193133d49cd9ff3ff0b5053020891cf8.exe 22 PID 2144 wrote to memory of 464 2144 193133d49cd9ff3ff0b5053020891cf8.exe 22 PID 2144 wrote to memory of 464 2144 193133d49cd9ff3ff0b5053020891cf8.exe 22 PID 2144 wrote to memory of 464 2144 193133d49cd9ff3ff0b5053020891cf8.exe 22 PID 2144 wrote to memory of 464 2144 193133d49cd9ff3ff0b5053020891cf8.exe 22 PID 2144 wrote to memory of 464 2144 193133d49cd9ff3ff0b5053020891cf8.exe 22 PID 2144 wrote to memory of 464 2144 193133d49cd9ff3ff0b5053020891cf8.exe 22 PID 2144 wrote to memory of 480 2144 193133d49cd9ff3ff0b5053020891cf8.exe 21 PID 2144 wrote to memory of 480 2144 193133d49cd9ff3ff0b5053020891cf8.exe 21 PID 2144 wrote to memory of 480 2144 193133d49cd9ff3ff0b5053020891cf8.exe 21 PID 2144 wrote to memory of 480 2144 193133d49cd9ff3ff0b5053020891cf8.exe 21 PID 2144 wrote to memory of 480 2144 193133d49cd9ff3ff0b5053020891cf8.exe 21 PID 2144 wrote to memory of 480 2144 193133d49cd9ff3ff0b5053020891cf8.exe 21 PID 2144 wrote to memory of 480 2144 193133d49cd9ff3ff0b5053020891cf8.exe 21 PID 2144 wrote to memory of 488 2144 193133d49cd9ff3ff0b5053020891cf8.exe 20 PID 2144 wrote to memory of 488 2144 193133d49cd9ff3ff0b5053020891cf8.exe 20 PID 2144 wrote to memory of 488 2144 193133d49cd9ff3ff0b5053020891cf8.exe 20 PID 2144 wrote to memory of 488 2144 193133d49cd9ff3ff0b5053020891cf8.exe 20 PID 2144 wrote to memory of 488 2144 193133d49cd9ff3ff0b5053020891cf8.exe 20 PID 2144 wrote to memory of 488 2144 193133d49cd9ff3ff0b5053020891cf8.exe 20 PID 2144 wrote to memory of 488 2144 193133d49cd9ff3ff0b5053020891cf8.exe 20 PID 2144 wrote to memory of 600 2144 193133d49cd9ff3ff0b5053020891cf8.exe 19 PID 2144 wrote to memory of 600 2144 193133d49cd9ff3ff0b5053020891cf8.exe 19 PID 2144 wrote to memory of 600 2144 193133d49cd9ff3ff0b5053020891cf8.exe 19 PID 2144 wrote to memory of 600 2144 193133d49cd9ff3ff0b5053020891cf8.exe 19 PID 2144 wrote to memory of 600 2144 193133d49cd9ff3ff0b5053020891cf8.exe 19 PID 2144 wrote to memory of 600 2144 193133d49cd9ff3ff0b5053020891cf8.exe 19 PID 2144 wrote to memory of 600 2144 193133d49cd9ff3ff0b5053020891cf8.exe 19 PID 2144 wrote to memory of 676 2144 193133d49cd9ff3ff0b5053020891cf8.exe 18 PID 2144 wrote to memory of 676 2144 193133d49cd9ff3ff0b5053020891cf8.exe 18 PID 2144 wrote to memory of 676 2144 193133d49cd9ff3ff0b5053020891cf8.exe 18 PID 2144 wrote to memory of 676 2144 193133d49cd9ff3ff0b5053020891cf8.exe 18 PID 2144 wrote to memory of 676 2144 193133d49cd9ff3ff0b5053020891cf8.exe 18 PID 2144 wrote to memory of 676 2144 193133d49cd9ff3ff0b5053020891cf8.exe 18 PID 2144 wrote to memory of 676 2144 193133d49cd9ff3ff0b5053020891cf8.exe 18 PID 2144 wrote to memory of 760 2144 193133d49cd9ff3ff0b5053020891cf8.exe 17 PID 2144 wrote to memory of 760 2144 193133d49cd9ff3ff0b5053020891cf8.exe 17 PID 2144 wrote to memory of 760 2144 193133d49cd9ff3ff0b5053020891cf8.exe 17 PID 2144 wrote to memory of 760 2144 193133d49cd9ff3ff0b5053020891cf8.exe 17 PID 2144 wrote to memory of 760 2144 193133d49cd9ff3ff0b5053020891cf8.exe 17 PID 2144 wrote to memory of 760 2144 193133d49cd9ff3ff0b5053020891cf8.exe 17 PID 2144 wrote to memory of 760 2144 193133d49cd9ff3ff0b5053020891cf8.exe 17 PID 2144 wrote to memory of 800 2144 193133d49cd9ff3ff0b5053020891cf8.exe 16
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe1⤵PID:2276
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation1⤵PID:820
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1136
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\193133d49cd9ff3ff0b5053020891cf8.exe"C:\Users\Admin\AppData\Local\Temp\193133d49cd9ff3ff0b5053020891cf8.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2144
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork1⤵PID:1088
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:916
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService1⤵PID:276
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService1⤵PID:968
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵PID:856
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted1⤵PID:800
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵PID:760
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS1⤵PID:676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵PID:600
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:488
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:480
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:464
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:384
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:372