Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 12:13
Behavioral task
behavioral1
Sample
4606bea551670d84e212c22913a02482e0b6b7a7ced51ce8292429e8226ca540.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4606bea551670d84e212c22913a02482e0b6b7a7ced51ce8292429e8226ca540.exe
Resource
win10v2004-20231215-en
General
-
Target
4606bea551670d84e212c22913a02482e0b6b7a7ced51ce8292429e8226ca540.exe
-
Size
536KB
-
MD5
ba87e864b94b3898b41f70784214ccd1
-
SHA1
a2e1f5ef52c5d3c187a1ba52f3d7631cedeb1e3c
-
SHA256
4606bea551670d84e212c22913a02482e0b6b7a7ced51ce8292429e8226ca540
-
SHA512
84095845e50f71d40421efd9b5569ee0261be34ef59dadbf53c053470e2226b38353043fa75cf379745c566a17c3ee58cb2f384103cfa186ef1cecf134b89130
-
SSDEEP
12288:Nhf0Bs9bDDq9hu53Ltp/p+gPhhwPOaoTJRkmOkx2LIa:NdQyDL9xp/BGA1RkmOkx2LF
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3036-0-0x0000000001230000-0x0000000001332000-memory.dmp upx -
Unexpected DNS network traffic destination 4 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 223.5.5.5 Destination IP 223.5.5.5 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\33fa38 4606bea551670d84e212c22913a02482e0b6b7a7ced51ce8292429e8226ca540.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 3036 4606bea551670d84e212c22913a02482e0b6b7a7ced51ce8292429e8226ca540.exe 3036 4606bea551670d84e212c22913a02482e0b6b7a7ced51ce8292429e8226ca540.exe 3036 4606bea551670d84e212c22913a02482e0b6b7a7ced51ce8292429e8226ca540.exe 3036 4606bea551670d84e212c22913a02482e0b6b7a7ced51ce8292429e8226ca540.exe 3036 4606bea551670d84e212c22913a02482e0b6b7a7ced51ce8292429e8226ca540.exe 1212 Explorer.EXE 1212 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3036 4606bea551670d84e212c22913a02482e0b6b7a7ced51ce8292429e8226ca540.exe Token: SeTcbPrivilege 3036 4606bea551670d84e212c22913a02482e0b6b7a7ced51ce8292429e8226ca540.exe Token: SeDebugPrivilege 3036 4606bea551670d84e212c22913a02482e0b6b7a7ced51ce8292429e8226ca540.exe Token: SeDebugPrivilege 1212 Explorer.EXE Token: SeTcbPrivilege 1212 Explorer.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3036 wrote to memory of 1212 3036 4606bea551670d84e212c22913a02482e0b6b7a7ced51ce8292429e8226ca540.exe 10 PID 3036 wrote to memory of 1212 3036 4606bea551670d84e212c22913a02482e0b6b7a7ced51ce8292429e8226ca540.exe 10 PID 3036 wrote to memory of 1212 3036 4606bea551670d84e212c22913a02482e0b6b7a7ced51ce8292429e8226ca540.exe 10
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\4606bea551670d84e212c22913a02482e0b6b7a7ced51ce8292429e8226ca540.exe"C:\Users\Admin\AppData\Local\Temp\4606bea551670d84e212c22913a02482e0b6b7a7ced51ce8292429e8226ca540.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3036
-