Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
73s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 12:39
Behavioral task
behavioral1
Sample
8debd2fca7068132a614e4b32c53d8708e6d415206119d57869681a3268b4782.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8debd2fca7068132a614e4b32c53d8708e6d415206119d57869681a3268b4782.exe
Resource
win10v2004-20231222-en
General
-
Target
8debd2fca7068132a614e4b32c53d8708e6d415206119d57869681a3268b4782.exe
-
Size
536KB
-
MD5
70054579e3bcac8579c103da9a50b14b
-
SHA1
8201df1855f96a50cd3f95645cacc3fd2f5e4c2d
-
SHA256
8debd2fca7068132a614e4b32c53d8708e6d415206119d57869681a3268b4782
-
SHA512
73042c48371dd8128b88884d2a3ac983cb341a6efdc3c823ae418ecfee2cf4ded822fbbb9f40974c4bd108e929c76c88a96f6267d656cc61300e5519d69188a3
-
SSDEEP
12288:Rhf0Bs9bDDq9hu53Ltp/p+gPhhwPOaoTJRkmOkx2LIa:RdQyDL9xp/BGA1RkmOkx2LF
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1280-0-0x00000000000A0000-0x00000000001A2000-memory.dmp upx behavioral2/memory/1280-13-0x00000000000A0000-0x00000000001A2000-memory.dmp upx behavioral2/memory/1280-24-0x00000000000A0000-0x00000000001A2000-memory.dmp upx behavioral2/memory/1280-25-0x00000000000A0000-0x00000000001A2000-memory.dmp upx behavioral2/memory/1280-28-0x00000000000A0000-0x00000000001A2000-memory.dmp upx behavioral2/memory/1280-40-0x00000000000A0000-0x00000000001A2000-memory.dmp upx behavioral2/memory/1280-64-0x00000000000A0000-0x00000000001A2000-memory.dmp upx -
Unexpected DNS network traffic destination 4 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 223.5.5.5 Destination IP 223.5.5.5 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\15ea00 8debd2fca7068132a614e4b32c53d8708e6d415206119d57869681a3268b4782.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1280 8debd2fca7068132a614e4b32c53d8708e6d415206119d57869681a3268b4782.exe 1280 8debd2fca7068132a614e4b32c53d8708e6d415206119d57869681a3268b4782.exe 1280 8debd2fca7068132a614e4b32c53d8708e6d415206119d57869681a3268b4782.exe 1280 8debd2fca7068132a614e4b32c53d8708e6d415206119d57869681a3268b4782.exe 1280 8debd2fca7068132a614e4b32c53d8708e6d415206119d57869681a3268b4782.exe 1280 8debd2fca7068132a614e4b32c53d8708e6d415206119d57869681a3268b4782.exe 1280 8debd2fca7068132a614e4b32c53d8708e6d415206119d57869681a3268b4782.exe 1280 8debd2fca7068132a614e4b32c53d8708e6d415206119d57869681a3268b4782.exe 3488 Explorer.EXE 3488 Explorer.EXE 3488 Explorer.EXE 3488 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1280 8debd2fca7068132a614e4b32c53d8708e6d415206119d57869681a3268b4782.exe Token: SeTcbPrivilege 1280 8debd2fca7068132a614e4b32c53d8708e6d415206119d57869681a3268b4782.exe Token: SeDebugPrivilege 1280 8debd2fca7068132a614e4b32c53d8708e6d415206119d57869681a3268b4782.exe Token: SeDebugPrivilege 3488 Explorer.EXE Token: SeTcbPrivilege 3488 Explorer.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1280 wrote to memory of 3488 1280 8debd2fca7068132a614e4b32c53d8708e6d415206119d57869681a3268b4782.exe 49 PID 1280 wrote to memory of 3488 1280 8debd2fca7068132a614e4b32c53d8708e6d415206119d57869681a3268b4782.exe 49 PID 1280 wrote to memory of 3488 1280 8debd2fca7068132a614e4b32c53d8708e6d415206119d57869681a3268b4782.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\8debd2fca7068132a614e4b32c53d8708e6d415206119d57869681a3268b4782.exe"C:\Users\Admin\AppData\Local\Temp\8debd2fca7068132a614e4b32c53d8708e6d415206119d57869681a3268b4782.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1280
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3488