Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 09:08
Static task
static1
Behavioral task
behavioral1
Sample
b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7.exe
Resource
win10v2004-20240611-en
General
-
Target
b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7.exe
-
Size
317KB
-
MD5
83780e63f48cb21bea3e734857892bc1
-
SHA1
2dcd36b040a882756d85616edc92cacbdeaa4067
-
SHA256
b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7
-
SHA512
6ef619064cc2422051efa081446fa5545920a829bf080bd6362a20d4ccb459e9abcf7e8c8131c3e357b710e4730f49e3256e54d74f42d523f44bbaf8929cdc5b
-
SSDEEP
6144:haTKwZxUmcOf5Zht6W46r9YOz+RpXKr9qNRyk7kLDyqqiJ6n4+OUP7cu8hPIRDxC:wTtTUmhZr6q9NqDGDypiK5O9hjn
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\194d45ab = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\{17727691-2621-4B66-94EF-0DCD9BF7C376}\\194d45ab.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\194d45ab = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\{17727691-2621-4B66-94EF-0DCD9BF7C376}\\194d45ab.exe" explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1572 set thread context of 4036 1572 b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7.exe 95 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe 4440 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4036 b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7.exe 4036 b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe Token: SeDebugPrivilege 4440 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1572 b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1572 wrote to memory of 4036 1572 b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7.exe 95 PID 1572 wrote to memory of 4036 1572 b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7.exe 95 PID 1572 wrote to memory of 4036 1572 b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7.exe 95 PID 1572 wrote to memory of 4036 1572 b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7.exe 95 PID 1572 wrote to memory of 4036 1572 b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7.exe 95 PID 1572 wrote to memory of 4036 1572 b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7.exe 95 PID 1572 wrote to memory of 4036 1572 b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7.exe 95 PID 1572 wrote to memory of 4036 1572 b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7.exe 95 PID 1572 wrote to memory of 4036 1572 b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7.exe 95 PID 1572 wrote to memory of 4036 1572 b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7.exe 95 PID 4036 wrote to memory of 4440 4036 b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7.exe 96 PID 4036 wrote to memory of 4440 4036 b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7.exe 96 PID 4036 wrote to memory of 4440 4036 b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7.exe"C:\Users\Admin\AppData\Local\Temp\b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7.exe"C:\Users\Admin\AppData\Local\Temp\b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4440
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4192,i,1305347165619645738,15927664461101562802,262144 --variations-seed-version --mojo-platform-channel-handle=4204 /prefetch:81⤵PID:4488