Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 10:44
Behavioral task
behavioral1
Sample
7205dcffb1696a4c427ad4eb2cf6b4a2.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
7205dcffb1696a4c427ad4eb2cf6b4a2.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
7205dcffb1696a4c427ad4eb2cf6b4a2.exe
-
Size
19KB
-
MD5
7205dcffb1696a4c427ad4eb2cf6b4a2
-
SHA1
bca3708cc028d5f541579839448b32bb81ee9f6c
-
SHA256
acc75b97c44c074c302f287fabb1b1ced50bb08ac01cf0281b9d5b6a27befac3
-
SHA512
e0ab2d4f4ce30d277d66b64da1da56de0d914506436cf4511b60f0b2062d5582dc9321ca5a3597c2f40bd9d9a7462c8e24731e9edb27fc4112679a7bd4b5f749
-
SSDEEP
384:m9aHrWRiM1Z3Wq6JVYNCA1BDrYLR7PcThAsQ3/z7Q+sQUADQ:wwrWgM1kjYNLTIR7EThAsQ3r7Q+Xjs
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1480-0-0x0000000010000000-0x0000000010012000-memory.dmp upx behavioral2/memory/1480-1-0x0000000010000000-0x0000000010012000-memory.dmp upx behavioral2/memory/1480-3-0x0000000010000000-0x0000000010012000-memory.dmp upx behavioral2/memory/1480-2-0x0000000010000000-0x0000000010012000-memory.dmp upx behavioral2/memory/1480-4-0x0000000010000000-0x0000000010012000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1504 1480 WerFault.exe 19 -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1480 7205dcffb1696a4c427ad4eb2cf6b4a2.exe Token: SeLoadDriverPrivilege 1480 7205dcffb1696a4c427ad4eb2cf6b4a2.exe Token: SeBackupPrivilege 1480 7205dcffb1696a4c427ad4eb2cf6b4a2.exe Token: SeRestorePrivilege 1480 7205dcffb1696a4c427ad4eb2cf6b4a2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7205dcffb1696a4c427ad4eb2cf6b4a2.exe"C:\Users\Admin\AppData\Local\Temp\7205dcffb1696a4c427ad4eb2cf6b4a2.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 3122⤵
- Program crash
PID:1504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1480 -ip 14801⤵PID:1172