Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 10:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
17a68c6145e3cd2238e420b19caa96f3.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
17a68c6145e3cd2238e420b19caa96f3.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
17a68c6145e3cd2238e420b19caa96f3.exe
-
Size
852KB
-
MD5
17a68c6145e3cd2238e420b19caa96f3
-
SHA1
ffcb7eff513542242100a871db1a4105f952259a
-
SHA256
4bd95b1d347ffcb27b10ca7178fd9408f25b101dc5f3d9ddcffce3ddbb1ea634
-
SHA512
c610cc475f96866ea660929d5e6237e67eced67a1f8a1bee2cd7dd4464b4103caedb8401f0233d12aa496748886c5df6331fd29af0b5af69587f1a0f0e4268bd
-
SSDEEP
12288:n2fsSv2g+MPsC3oKKE9fDhQVE2VEoH6H35pSJ6u4HiEaNX9f9N340uxb16:nFjg+Wp3oKKEdNO9lapxCPD3q36
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Prevent run applications windows = "C:\\Users\\Admin\\AppData\\Local\\Temp\\17a68c6145e3cd2238e420b19caa96f3.exe" 17a68c6145e3cd2238e420b19caa96f3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2844 17a68c6145e3cd2238e420b19caa96f3.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe 2844 17a68c6145e3cd2238e420b19caa96f3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2940 2844 17a68c6145e3cd2238e420b19caa96f3.exe 29 PID 2844 wrote to memory of 2940 2844 17a68c6145e3cd2238e420b19caa96f3.exe 29 PID 2844 wrote to memory of 2940 2844 17a68c6145e3cd2238e420b19caa96f3.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\17a68c6145e3cd2238e420b19caa96f3.exe"C:\Users\Admin\AppData\Local\Temp\17a68c6145e3cd2238e420b19caa96f3.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2844 -s 10362⤵PID:2940
-