Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 19:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
370e363e3db49a0b1956405873758e18.exe
Resource
win7-20231215-en
5 signatures
150 seconds
General
-
Target
370e363e3db49a0b1956405873758e18.exe
-
Size
2.0MB
-
MD5
370e363e3db49a0b1956405873758e18
-
SHA1
692238a66c601f19bc6e19f3dd81e3fb4e75d622
-
SHA256
65e4b5250e0b47314c84487ebf0acf8b722732dbec4e1ee0500742904b28055d
-
SHA512
cc09dbe36147e4b4605b70af6d825160ccb12f74299af02649638b24e9f4fbc92a9d77e4280b6481b00a6652b1772497ae3135ff12eeb4661f3c50bd05adb583
-
SSDEEP
49152:ArStaYC/0KF3klGilRuarM9SISu5hoeWotoK3B0KLGMFT:AYaYbe3sl4aru7kPotoK3BDX
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 370e363e3db49a0b1956405873758e18.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 370e363e3db49a0b1956405873758e18.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2344 2084 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2084 370e363e3db49a0b1956405873758e18.exe 2084 370e363e3db49a0b1956405873758e18.exe 2648 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2084 370e363e3db49a0b1956405873758e18.exe Token: SeDebugPrivilege 2648 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2648 2084 370e363e3db49a0b1956405873758e18.exe 28 PID 2084 wrote to memory of 2648 2084 370e363e3db49a0b1956405873758e18.exe 28 PID 2084 wrote to memory of 2648 2084 370e363e3db49a0b1956405873758e18.exe 28 PID 2084 wrote to memory of 2648 2084 370e363e3db49a0b1956405873758e18.exe 28 PID 2084 wrote to memory of 2344 2084 370e363e3db49a0b1956405873758e18.exe 30 PID 2084 wrote to memory of 2344 2084 370e363e3db49a0b1956405873758e18.exe 30 PID 2084 wrote to memory of 2344 2084 370e363e3db49a0b1956405873758e18.exe 30 PID 2084 wrote to memory of 2344 2084 370e363e3db49a0b1956405873758e18.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\370e363e3db49a0b1956405873758e18.exe"C:\Users\Admin\AppData\Local\Temp\370e363e3db49a0b1956405873758e18.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 6442⤵
- Program crash
PID:2344
-