Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 16:47
Behavioral task
behavioral1
Sample
b7e3de2c7de02cd4b3204a7821e7518c.exe
Resource
win7-20240215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
b7e3de2c7de02cd4b3204a7821e7518c.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
b7e3de2c7de02cd4b3204a7821e7518c.exe
-
Size
112KB
-
MD5
b7e3de2c7de02cd4b3204a7821e7518c
-
SHA1
79cc4609ae6e2d6145b208844d06a48337cf2d31
-
SHA256
87fdc759c2cdbd2c12050321171f6e35915ccfa6cbe3855c429a214c184161ec
-
SHA512
86ec99b98feb972e00e52967e40dce86e354fd9760374af5c54eb5ebf99c8085bc715f960e77ee7e6d3b6cf8f38ea726c9f26818333d1c488cb097dd2b3e51be
-
SSDEEP
3072:74094zBb8bsbUFB2FNjvqReajSE2CqXgbGddM0tW5O:71+FY0JScwSdbwbGdG0t/
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4568-0-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral2/memory/4568-2-0x0000000000400000-0x000000000044D000-memory.dmp upx -
Kills process with taskkill 2 IoCs
pid Process 464 taskkill.exe 4584 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4584 taskkill.exe Token: SeDebugPrivilege 464 taskkill.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4568 wrote to memory of 464 4568 b7e3de2c7de02cd4b3204a7821e7518c.exe 97 PID 4568 wrote to memory of 464 4568 b7e3de2c7de02cd4b3204a7821e7518c.exe 97 PID 4568 wrote to memory of 464 4568 b7e3de2c7de02cd4b3204a7821e7518c.exe 97 PID 4568 wrote to memory of 4584 4568 b7e3de2c7de02cd4b3204a7821e7518c.exe 98 PID 4568 wrote to memory of 4584 4568 b7e3de2c7de02cd4b3204a7821e7518c.exe 98 PID 4568 wrote to memory of 4584 4568 b7e3de2c7de02cd4b3204a7821e7518c.exe 98 PID 4568 wrote to memory of 2656 4568 b7e3de2c7de02cd4b3204a7821e7518c.exe 101 PID 4568 wrote to memory of 2656 4568 b7e3de2c7de02cd4b3204a7821e7518c.exe 101 PID 4568 wrote to memory of 2656 4568 b7e3de2c7de02cd4b3204a7821e7518c.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7e3de2c7de02cd4b3204a7821e7518c.exe"C:\Users\Admin\AppData\Local\Temp\b7e3de2c7de02cd4b3204a7821e7518c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im KsafeTray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:464
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Knsdtray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4584
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Remoete.dll" WWWW2⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵PID:1212