Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 05:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
08648143bdf285e755e2d721fc573a87.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
08648143bdf285e755e2d721fc573a87.exe
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
08648143bdf285e755e2d721fc573a87.exe
-
Size
73KB
-
MD5
08648143bdf285e755e2d721fc573a87
-
SHA1
3044cbd8673958f4b0ff5b44ddc4974c040d0910
-
SHA256
08a6e3a364e206fdafb1f0bc0a1e97dddd382d74b10d8c38b51500d3b0b0e8cc
-
SHA512
0f8f7c8f171ac9346381b39f11c56703c0d71f49325b1cfb9190dfb931f7e01e970e4ae0d1fda82f434152f4673d8c52717a00e6be25af1e26ad336dbb82b175
-
SSDEEP
1536:t2L+AUTpldYoCuvMuGakmx1psi1ZLS7HL5TMeqF:t2L+AUTpldmukuG41si1ZLS7Hh
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2336 08648143bdf285e755e2d721fc573a87.exe -
Suspicious behavior: MapViewOfSection 21 IoCs
pid Process 2336 08648143bdf285e755e2d721fc573a87.exe 2336 08648143bdf285e755e2d721fc573a87.exe 2336 08648143bdf285e755e2d721fc573a87.exe 2336 08648143bdf285e755e2d721fc573a87.exe 2336 08648143bdf285e755e2d721fc573a87.exe 2336 08648143bdf285e755e2d721fc573a87.exe 2336 08648143bdf285e755e2d721fc573a87.exe 2336 08648143bdf285e755e2d721fc573a87.exe 2336 08648143bdf285e755e2d721fc573a87.exe 2336 08648143bdf285e755e2d721fc573a87.exe 2336 08648143bdf285e755e2d721fc573a87.exe 2336 08648143bdf285e755e2d721fc573a87.exe 2336 08648143bdf285e755e2d721fc573a87.exe 2336 08648143bdf285e755e2d721fc573a87.exe 2336 08648143bdf285e755e2d721fc573a87.exe 2336 08648143bdf285e755e2d721fc573a87.exe 2336 08648143bdf285e755e2d721fc573a87.exe 2336 08648143bdf285e755e2d721fc573a87.exe 2336 08648143bdf285e755e2d721fc573a87.exe 2336 08648143bdf285e755e2d721fc573a87.exe 2336 08648143bdf285e755e2d721fc573a87.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2336 08648143bdf285e755e2d721fc573a87.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2336 wrote to memory of 376 2336 08648143bdf285e755e2d721fc573a87.exe 2 PID 2336 wrote to memory of 376 2336 08648143bdf285e755e2d721fc573a87.exe 2 PID 2336 wrote to memory of 376 2336 08648143bdf285e755e2d721fc573a87.exe 2 PID 2336 wrote to memory of 376 2336 08648143bdf285e755e2d721fc573a87.exe 2 PID 2336 wrote to memory of 376 2336 08648143bdf285e755e2d721fc573a87.exe 2 PID 2336 wrote to memory of 388 2336 08648143bdf285e755e2d721fc573a87.exe 1 PID 2336 wrote to memory of 388 2336 08648143bdf285e755e2d721fc573a87.exe 1 PID 2336 wrote to memory of 388 2336 08648143bdf285e755e2d721fc573a87.exe 1 PID 2336 wrote to memory of 388 2336 08648143bdf285e755e2d721fc573a87.exe 1 PID 2336 wrote to memory of 388 2336 08648143bdf285e755e2d721fc573a87.exe 1 PID 2336 wrote to memory of 424 2336 08648143bdf285e755e2d721fc573a87.exe 5 PID 2336 wrote to memory of 424 2336 08648143bdf285e755e2d721fc573a87.exe 5 PID 2336 wrote to memory of 424 2336 08648143bdf285e755e2d721fc573a87.exe 5 PID 2336 wrote to memory of 424 2336 08648143bdf285e755e2d721fc573a87.exe 5 PID 2336 wrote to memory of 424 2336 08648143bdf285e755e2d721fc573a87.exe 5 PID 2336 wrote to memory of 468 2336 08648143bdf285e755e2d721fc573a87.exe 6 PID 2336 wrote to memory of 468 2336 08648143bdf285e755e2d721fc573a87.exe 6 PID 2336 wrote to memory of 468 2336 08648143bdf285e755e2d721fc573a87.exe 6 PID 2336 wrote to memory of 468 2336 08648143bdf285e755e2d721fc573a87.exe 6 PID 2336 wrote to memory of 468 2336 08648143bdf285e755e2d721fc573a87.exe 6 PID 2336 wrote to memory of 484 2336 08648143bdf285e755e2d721fc573a87.exe 7 PID 2336 wrote to memory of 484 2336 08648143bdf285e755e2d721fc573a87.exe 7 PID 2336 wrote to memory of 484 2336 08648143bdf285e755e2d721fc573a87.exe 7 PID 2336 wrote to memory of 484 2336 08648143bdf285e755e2d721fc573a87.exe 7 PID 2336 wrote to memory of 484 2336 08648143bdf285e755e2d721fc573a87.exe 7 PID 2336 wrote to memory of 492 2336 08648143bdf285e755e2d721fc573a87.exe 8 PID 2336 wrote to memory of 492 2336 08648143bdf285e755e2d721fc573a87.exe 8 PID 2336 wrote to memory of 492 2336 08648143bdf285e755e2d721fc573a87.exe 8 PID 2336 wrote to memory of 492 2336 08648143bdf285e755e2d721fc573a87.exe 8 PID 2336 wrote to memory of 492 2336 08648143bdf285e755e2d721fc573a87.exe 8 PID 2336 wrote to memory of 604 2336 08648143bdf285e755e2d721fc573a87.exe 27 PID 2336 wrote to memory of 604 2336 08648143bdf285e755e2d721fc573a87.exe 27 PID 2336 wrote to memory of 604 2336 08648143bdf285e755e2d721fc573a87.exe 27 PID 2336 wrote to memory of 604 2336 08648143bdf285e755e2d721fc573a87.exe 27 PID 2336 wrote to memory of 604 2336 08648143bdf285e755e2d721fc573a87.exe 27 PID 2336 wrote to memory of 680 2336 08648143bdf285e755e2d721fc573a87.exe 26 PID 2336 wrote to memory of 680 2336 08648143bdf285e755e2d721fc573a87.exe 26 PID 2336 wrote to memory of 680 2336 08648143bdf285e755e2d721fc573a87.exe 26 PID 2336 wrote to memory of 680 2336 08648143bdf285e755e2d721fc573a87.exe 26 PID 2336 wrote to memory of 680 2336 08648143bdf285e755e2d721fc573a87.exe 26 PID 2336 wrote to memory of 768 2336 08648143bdf285e755e2d721fc573a87.exe 25 PID 2336 wrote to memory of 768 2336 08648143bdf285e755e2d721fc573a87.exe 25 PID 2336 wrote to memory of 768 2336 08648143bdf285e755e2d721fc573a87.exe 25 PID 2336 wrote to memory of 768 2336 08648143bdf285e755e2d721fc573a87.exe 25 PID 2336 wrote to memory of 768 2336 08648143bdf285e755e2d721fc573a87.exe 25 PID 2336 wrote to memory of 820 2336 08648143bdf285e755e2d721fc573a87.exe 24 PID 2336 wrote to memory of 820 2336 08648143bdf285e755e2d721fc573a87.exe 24 PID 2336 wrote to memory of 820 2336 08648143bdf285e755e2d721fc573a87.exe 24 PID 2336 wrote to memory of 820 2336 08648143bdf285e755e2d721fc573a87.exe 24 PID 2336 wrote to memory of 820 2336 08648143bdf285e755e2d721fc573a87.exe 24 PID 2336 wrote to memory of 844 2336 08648143bdf285e755e2d721fc573a87.exe 9 PID 2336 wrote to memory of 844 2336 08648143bdf285e755e2d721fc573a87.exe 9 PID 2336 wrote to memory of 844 2336 08648143bdf285e755e2d721fc573a87.exe 9 PID 2336 wrote to memory of 844 2336 08648143bdf285e755e2d721fc573a87.exe 9 PID 2336 wrote to memory of 844 2336 08648143bdf285e755e2d721fc573a87.exe 9 PID 2336 wrote to memory of 972 2336 08648143bdf285e755e2d721fc573a87.exe 10 PID 2336 wrote to memory of 972 2336 08648143bdf285e755e2d721fc573a87.exe 10 PID 2336 wrote to memory of 972 2336 08648143bdf285e755e2d721fc573a87.exe 10 PID 2336 wrote to memory of 972 2336 08648143bdf285e755e2d721fc573a87.exe 10 PID 2336 wrote to memory of 972 2336 08648143bdf285e755e2d721fc573a87.exe 10 PID 2336 wrote to memory of 284 2336 08648143bdf285e755e2d721fc573a87.exe 11 PID 2336 wrote to memory of 284 2336 08648143bdf285e755e2d721fc573a87.exe 11 PID 2336 wrote to memory of 284 2336 08648143bdf285e755e2d721fc573a87.exe 11 PID 2336 wrote to memory of 284 2336 08648143bdf285e755e2d721fc573a87.exe 11
Processes
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:388
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:376
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:844
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:972
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:284
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1232
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:392
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:2384
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1052
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:332
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:820
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:768
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:680
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:604
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:484
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:492
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:424
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\08648143bdf285e755e2d721fc573a87.exe"C:\Users\Admin\AppData\Local\Temp\08648143bdf285e755e2d721fc573a87.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1100
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1372