Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 22:41
Static task
static1
Behavioral task
behavioral1
Sample
4104e42bdd7716c6cf31d5d6cb6f0f55.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4104e42bdd7716c6cf31d5d6cb6f0f55.exe
Resource
win10v2004-20231215-en
General
-
Target
4104e42bdd7716c6cf31d5d6cb6f0f55.exe
-
Size
181KB
-
MD5
4104e42bdd7716c6cf31d5d6cb6f0f55
-
SHA1
1c48609bd7db7a3dffd0d13480a03d9972fc8c0e
-
SHA256
7df9c5d9955726337683c225491ed38609b89516a58ec1f20058ce955f715207
-
SHA512
8df6069f3372b4512bf5e3d751e0cfa823f1acddc1a9d245ce1844dcd489fd13979f5804606da6bb359116adbcddb4a3c56493545f694fcde88bc0112f16260b
-
SSDEEP
3072:cg+lAuXo30X3FcTl5C4oQbWoDayYDH6EkGh7P5xejAp0i7sB7/bw/lYuUysQ0+Yl:UlAU4omWoDayY1Xh7hrp0MywNYu05H0g
Malware Config
Signatures
-
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 4104e42bdd7716c6cf31d5d6cb6f0f55.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe 4104e42bdd7716c6cf31d5d6cb6f0f55.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3292 4976 WerFault.exe 87 -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeShutdownPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeIncreaseQuotaPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeSecurityPrivilege 1116 msiexec.exe Token: SeCreateTokenPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeAssignPrimaryTokenPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeLockMemoryPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeIncreaseQuotaPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeMachineAccountPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeTcbPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeSecurityPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeTakeOwnershipPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeLoadDriverPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeSystemProfilePrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeSystemtimePrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeProfSingleProcessPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeIncBasePriorityPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeCreatePagefilePrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeCreatePermanentPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeBackupPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeRestorePrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeShutdownPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeDebugPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeAuditPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeSystemEnvironmentPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeChangeNotifyPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeRemoteShutdownPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeUndockPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeSyncAgentPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeEnableDelegationPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeManageVolumePrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeImpersonatePrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeCreateGlobalPrivilege 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe 4976 4104e42bdd7716c6cf31d5d6cb6f0f55.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4104e42bdd7716c6cf31d5d6cb6f0f55.exe"C:\Users\Admin\AppData\Local\Temp\4104e42bdd7716c6cf31d5d6cb6f0f55.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 8882⤵
- Program crash
PID:3292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4976 -ip 49761⤵PID:992
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1116