Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 03:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0c88c7bae7b8927102a90d352b0aaeaf.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
0c88c7bae7b8927102a90d352b0aaeaf.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
0c88c7bae7b8927102a90d352b0aaeaf.exe
-
Size
710KB
-
MD5
0c88c7bae7b8927102a90d352b0aaeaf
-
SHA1
d1aee00059d5d0f98c280a5280a2f3cd9cbeac99
-
SHA256
360f1e9c86a6b2e1b6e033d665f6b4d22e98b7ff35475a1af162d8864e11eb11
-
SHA512
b746c64b132c0ca323b4ec11022f648996691ca5ebc949df03c17e155504be3bb7a45dcbfead1ba0a2ecb3f5b141a3b49ec1ee47708380417db49819e10032ee
-
SSDEEP
12288:h7SJpVBMOxMntc+Z/YaL7jRphSF3Z4mxxJE4JpLzRbK/zAqZqfW:h7SJlMeMnTZ3L7jIQmXJEiLNy0u
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1540 www.hmhk.cn.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\www.hmhk.cn.exe 0c88c7bae7b8927102a90d352b0aaeaf.exe File opened for modification C:\Windows\www.hmhk.cn.exe 0c88c7bae7b8927102a90d352b0aaeaf.exe File created C:\Windows\UNINSTAL.BAT 0c88c7bae7b8927102a90d352b0aaeaf.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3372 2236 WerFault.exe 46 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2236 0c88c7bae7b8927102a90d352b0aaeaf.exe Token: SeDebugPrivilege 1540 www.hmhk.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1540 www.hmhk.cn.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1540 wrote to memory of 4824 1540 www.hmhk.cn.exe 94 PID 1540 wrote to memory of 4824 1540 www.hmhk.cn.exe 94 PID 2236 wrote to memory of 2368 2236 0c88c7bae7b8927102a90d352b0aaeaf.exe 99 PID 2236 wrote to memory of 2368 2236 0c88c7bae7b8927102a90d352b0aaeaf.exe 99 PID 2236 wrote to memory of 2368 2236 0c88c7bae7b8927102a90d352b0aaeaf.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c88c7bae7b8927102a90d352b0aaeaf.exe"C:\Users\Admin\AppData\Local\Temp\0c88c7bae7b8927102a90d352b0aaeaf.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 6002⤵
- Program crash
PID:3372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\UNINSTAL.BAT2⤵PID:2368
-
-
C:\Windows\www.hmhk.cn.exeC:\Windows\www.hmhk.cn.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:4824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2236 -ip 22361⤵PID:5004