Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 10:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
17a68c6145e3cd2238e420b19caa96f3.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
17a68c6145e3cd2238e420b19caa96f3.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
17a68c6145e3cd2238e420b19caa96f3.exe
-
Size
852KB
-
MD5
17a68c6145e3cd2238e420b19caa96f3
-
SHA1
ffcb7eff513542242100a871db1a4105f952259a
-
SHA256
4bd95b1d347ffcb27b10ca7178fd9408f25b101dc5f3d9ddcffce3ddbb1ea634
-
SHA512
c610cc475f96866ea660929d5e6237e67eced67a1f8a1bee2cd7dd4464b4103caedb8401f0233d12aa496748886c5df6331fd29af0b5af69587f1a0f0e4268bd
-
SSDEEP
12288:n2fsSv2g+MPsC3oKKE9fDhQVE2VEoH6H35pSJ6u4HiEaNX9f9N340uxb16:nFjg+Wp3oKKEdNO9lapxCPD3q36
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Prevent run applications windows = "C:\\Users\\Admin\\AppData\\Local\\Temp\\17a68c6145e3cd2238e420b19caa96f3.exe" 17a68c6145e3cd2238e420b19caa96f3.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 244 17a68c6145e3cd2238e420b19caa96f3.exe Token: 33 4740 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4740 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe 244 17a68c6145e3cd2238e420b19caa96f3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17a68c6145e3cd2238e420b19caa96f3.exe"C:\Users\Admin\AppData\Local\Temp\17a68c6145e3cd2238e420b19caa96f3.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:244
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2ec 0x4781⤵
- Suspicious use of AdjustPrivilegeToken
PID:4740