Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
14s -
max time network
30s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/02/2024, 19:07
Behavioral task
behavioral1
Sample
crack.exe
Resource
win11-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
runtime.dll
Resource
win11-20240221-en
0 signatures
150 seconds
General
-
Target
crack.exe
-
Size
10.3MB
-
MD5
35edb0779e02ec906ba08da6115eeae7
-
SHA1
c662f58d8421c854b30da34c6e0ddc37783cb953
-
SHA256
22646544be869e18d9b35687a6592c3ea1ac0d423badc40cb6059388b1bf362c
-
SHA512
82e2fe81587b40e96b4fef23819037809d94c1f0f11393c8b91387a0dbaa70c368498707cd7a66ba71056352af90619d1204db7067f7daa47060ee5c8eee889b
-
SSDEEP
98304:QqMT8fPVdo+hZ9ZWI3Blm+AgMnOZ0EVmCs9rhcw3M//OfYts2SsJXkn7IG/HPidx:cs1BlLjZ0EVmCs9rhlSm0siJdeJ
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\frAQBc8Wsa1xVPfv\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\frAQBc8Wsa1xVPfv" crack.exe -
resource yara_rule behavioral1/memory/3688-1-0x00007FF698F00000-0x00007FF69A3B4000-memory.dmp themida behavioral1/memory/3688-9-0x00007FF698F00000-0x00007FF69A3B4000-memory.dmp themida -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3688 crack.exe 3688 crack.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 3688 crack.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 3688 crack.exe