Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 09:18
Behavioral task
behavioral1
Sample
144d34c6fc809770681889c28ddefadd.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
144d34c6fc809770681889c28ddefadd.exe
Resource
win10v2004-20231222-en
General
-
Target
144d34c6fc809770681889c28ddefadd.exe
-
Size
91KB
-
MD5
144d34c6fc809770681889c28ddefadd
-
SHA1
e987ec191699c99002ac371be559f78d73c81d0a
-
SHA256
399d7f2ae9cbb0395cf1d49299aa74dfc31c9cd1674e00e1b9edd46b16ee6216
-
SHA512
d214b282f74963c0fcfe967acd603f475b19e19ffc240a69eadde3d10a8bb5086cf1a8c572497789274c9bff32e586430acde0be825f6ca36377a23c801bf605
-
SSDEEP
1536:DLJsQn+4g1FqgL3zQaP/+55ubKhZZaA9NWFNRbdmR7z+GrdODncNO1b3My8:32qgLEaXbCZZhwmx+GCncNYb8y
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1276 kernl32.exe 3024 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\kernl32.exe 144d34c6fc809770681889c28ddefadd.exe File opened for modification C:\Windows\SysWOW64\kernl32.exe 144d34c6fc809770681889c28ddefadd.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe 144d34c6fc809770681889c28ddefadd.exe File opened for modification C:\Windows\svchost.exe 144d34c6fc809770681889c28ddefadd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1276 kernl32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\144d34c6fc809770681889c28ddefadd.exe"C:\Users\Admin\AppData\Local\Temp\144d34c6fc809770681889c28ddefadd.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:316
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
PID:3024
-
C:\Windows\SysWOW64\kernl32.exeC:\Windows\SysWOW64\kernl32.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1276
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5d0dfd1bcadf39b25aa2f00846a700da6
SHA14fc21718ab5ca626542817a06155c087fa35f1fb
SHA256af1f7f89c96c4f27966f1af5c46b9a1064089efad08335cac36d260145f788c6
SHA512466cba36e4d552ef06f5bb1747d2a0b30f172953608ec10a02ec2493d671784e641803cb662d41091eb9e06c1b2b527b02811f8a2161ab661d3e02885c8adf45
-
Filesize
41KB
MD555de8a59e1470a9c99b3a8ed2fad1f5c
SHA1d11484e7dd02495b05795ac10795065de974d347
SHA256dfd430247ee0e81ff5088c9dd14d54fe8a4fcfbdece11d04d08c7749d8dbf5bb
SHA512f9399739b7a9750152bf9a6c9ae0d7f25a670e50802a8a6bf57fe9e0e87d59674f353c5d526ae438eb95a33bca6bdd1b2d40f7e9d851115c1f693e4ed9543de9