Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/02/2024, 14:15
Behavioral task
behavioral1
Sample
a3fe854723ec37a910eb2c9924b941ea.exe
Resource
win7-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
a3fe854723ec37a910eb2c9924b941ea.exe
Resource
win10v2004-20240221-en
4 signatures
150 seconds
General
-
Target
a3fe854723ec37a910eb2c9924b941ea.exe
-
Size
37KB
-
MD5
a3fe854723ec37a910eb2c9924b941ea
-
SHA1
6e6120b5c83e5f997156d0a16b9fa8ffe9a983f9
-
SHA256
0d65aac1dc725db5e6893fb97b2e2401b91ffc7fd2903e7a3c476e8701e202c5
-
SHA512
d7cb20f60e73901be9d570ff7c49bf0fcc63548dfc099284432618f465a2de91f7c758262310758dff7e05b21998bf0dcff49074f252edd992a9dd4f20a538ee
-
SSDEEP
384:Jste5aNitbFbOn0aH2ykrkmPbZ4znCSqrAF+rMRTyN/0L+EcoinblneHQM3epzXd:2t7MNWtkrkmzuDCFrM+rMRa8Nu66t
Score
8/10
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 348 netsh.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 2 2.tcp.ngrok.io 13 2.tcp.ngrok.io 30 2.tcp.ngrok.io -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: 33 1916 a3fe854723ec37a910eb2c9924b941ea.exe Token: SeIncBasePriorityPrivilege 1916 a3fe854723ec37a910eb2c9924b941ea.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 348 1916 a3fe854723ec37a910eb2c9924b941ea.exe 28 PID 1916 wrote to memory of 348 1916 a3fe854723ec37a910eb2c9924b941ea.exe 28 PID 1916 wrote to memory of 348 1916 a3fe854723ec37a910eb2c9924b941ea.exe 28 PID 1916 wrote to memory of 348 1916 a3fe854723ec37a910eb2c9924b941ea.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3fe854723ec37a910eb2c9924b941ea.exe"C:\Users\Admin\AppData\Local\Temp\a3fe854723ec37a910eb2c9924b941ea.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\a3fe854723ec37a910eb2c9924b941ea.exe" "a3fe854723ec37a910eb2c9924b941ea.exe" ENABLE2⤵
- Modifies Windows Firewall
PID:348
-