Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 05:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
03f00d915471f6f5d16aab035cd9200c.exe
Resource
win7-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
03f00d915471f6f5d16aab035cd9200c.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
03f00d915471f6f5d16aab035cd9200c.exe
-
Size
468KB
-
MD5
03f00d915471f6f5d16aab035cd9200c
-
SHA1
3c03852587aa81e4742c2b44ec4f2c85ca23391b
-
SHA256
ecd02ac8840e6a25878d9bfaef803f193e1f4b9faa2fba7e1ed5014ca969f1c4
-
SHA512
64b56aaa402c0582222d7dbf735fd8f7f0608ead07740afc0e559eacaa0686aed43f08a3e7909becd3a5ac52e79403f644b1a736287b9e6cc853566094bd42f2
-
SSDEEP
6144:U/Aa7Korb7gp6/pDxUC6eVy5QetdHZwJvJMxhnel93mdQoCX:8JKqb7gpMyIVnAFZwJxEh
Score
8/10
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4736 netsh.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2644 03f00d915471f6f5d16aab035cd9200c.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: 33 2644 03f00d915471f6f5d16aab035cd9200c.exe Token: SeIncBasePriorityPrivilege 2644 03f00d915471f6f5d16aab035cd9200c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2644 wrote to memory of 4736 2644 03f00d915471f6f5d16aab035cd9200c.exe 89 PID 2644 wrote to memory of 4736 2644 03f00d915471f6f5d16aab035cd9200c.exe 89 PID 2644 wrote to memory of 4736 2644 03f00d915471f6f5d16aab035cd9200c.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\03f00d915471f6f5d16aab035cd9200c.exe"C:\Users\Admin\AppData\Local\Temp\03f00d915471f6f5d16aab035cd9200c.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\03f00d915471f6f5d16aab035cd9200c.exe" "03f00d915471f6f5d16aab035cd9200c.exe" ENABLE2⤵
- Modifies Windows Firewall
PID:4736
-