Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 19:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
72d3eea8dae999596f79b0aef2d8ba8f1c1a47633809db34158e53ed7eb1b48f.exe
Resource
win7-20231215-en
3 signatures
150 seconds
General
-
Target
72d3eea8dae999596f79b0aef2d8ba8f1c1a47633809db34158e53ed7eb1b48f.exe
-
Size
8.0MB
-
MD5
1df2e3f5b6b4ab7b9624d24786c13418
-
SHA1
946f6d664b691a8924b3a842303d1eca16448380
-
SHA256
72d3eea8dae999596f79b0aef2d8ba8f1c1a47633809db34158e53ed7eb1b48f
-
SHA512
042babb37047fd743f44c85210cb4a11965a82bd264372c94b96e460e8ffa87418c06f73be2b4d6156a3c23382b6613885eb3d0441b1d17907b3cc5a9d4d10ac
-
SSDEEP
196608:G16TAZIPhQ2QKVWsHLI1bK2Q+7u/A/tinN0vV4Y:G17IPKTKcV1nQ+7u/A/tiWV4Y
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 72d3eea8dae999596f79b0aef2d8ba8f1c1a47633809db34158e53ed7eb1b48f.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{EABFAAEB-138B-4136-B7DB-CA97DB90037C} 72d3eea8dae999596f79b0aef2d8ba8f1c1a47633809db34158e53ed7eb1b48f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{EABFAAEB-138B-4136-B7DB-CA97DB90037C}\AppName = "72d3eea8dae999596f79b0aef2d8ba8f1c1a47633809db34158e53ed7eb1b48f.exe" 72d3eea8dae999596f79b0aef2d8ba8f1c1a47633809db34158e53ed7eb1b48f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{EABFAAEB-138B-4136-B7DB-CA97DB90037C}\AppPath = "C:\\Users\\Admin\\AppData\\Local\\Temp" 72d3eea8dae999596f79b0aef2d8ba8f1c1a47633809db34158e53ed7eb1b48f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{EABFAAEB-138B-4136-B7DB-CA97DB90037C}\Policy = "3" 72d3eea8dae999596f79b0aef2d8ba8f1c1a47633809db34158e53ed7eb1b48f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2992 72d3eea8dae999596f79b0aef2d8ba8f1c1a47633809db34158e53ed7eb1b48f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\72d3eea8dae999596f79b0aef2d8ba8f1c1a47633809db34158e53ed7eb1b48f.exe"C:\Users\Admin\AppData\Local\Temp\72d3eea8dae999596f79b0aef2d8ba8f1c1a47633809db34158e53ed7eb1b48f.exe"1⤵
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
PID:2992