Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 20:38
Static task
static1
Behavioral task
behavioral1
Sample
ee576267da08e8a7f008673ec475ab1050f76ddc0fc6b289f7ec1a314549fc94.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ee576267da08e8a7f008673ec475ab1050f76ddc0fc6b289f7ec1a314549fc94.exe
Resource
win10v2004-20240221-en
General
-
Target
ee576267da08e8a7f008673ec475ab1050f76ddc0fc6b289f7ec1a314549fc94.exe
-
Size
14.7MB
-
MD5
104c5aec55b5115be8689b5e3aedcd82
-
SHA1
70a23d94e02c34ec7a7b754221ba7895fa8ab0cb
-
SHA256
ee576267da08e8a7f008673ec475ab1050f76ddc0fc6b289f7ec1a314549fc94
-
SHA512
0d3994c533dc3f5736eb0a7042a5f048f1f4e01dab7cf20534d8b3774023ebae28ced59054c9bdf6ab6dc2d673b363a16b139ef7c3fa502126a345763b604eb5
-
SSDEEP
393216:nrA1FUWuTYUza1i9XRQFZygIt1xoxLO/kOR+UFT0:0EWuTp2i9XRQFXIt1qBoTi
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2148 ee576267da08e8a7f008673ec475ab1050f76ddc0fc6b289f7ec1a314549fc94.exe 2148 ee576267da08e8a7f008673ec475ab1050f76ddc0fc6b289f7ec1a314549fc94.exe 2148 ee576267da08e8a7f008673ec475ab1050f76ddc0fc6b289f7ec1a314549fc94.exe 2148 ee576267da08e8a7f008673ec475ab1050f76ddc0fc6b289f7ec1a314549fc94.exe 2148 ee576267da08e8a7f008673ec475ab1050f76ddc0fc6b289f7ec1a314549fc94.exe 2148 ee576267da08e8a7f008673ec475ab1050f76ddc0fc6b289f7ec1a314549fc94.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2148 ee576267da08e8a7f008673ec475ab1050f76ddc0fc6b289f7ec1a314549fc94.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2148 ee576267da08e8a7f008673ec475ab1050f76ddc0fc6b289f7ec1a314549fc94.exe 2148 ee576267da08e8a7f008673ec475ab1050f76ddc0fc6b289f7ec1a314549fc94.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee576267da08e8a7f008673ec475ab1050f76ddc0fc6b289f7ec1a314549fc94.exe"C:\Users\Admin\AppData\Local\Temp\ee576267da08e8a7f008673ec475ab1050f76ddc0fc6b289f7ec1a314549fc94.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2148