Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
98s -
max time network
142s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/08/2024, 08:44
Behavioral task
behavioral1
Sample
WPE collection (HxT)/SetPriv.dll
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
WPE collection (HxT)/Wpe Pro.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
WPE collection (HxT)/Wpe Sonic.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
WPE collection (HxT)/Wpe Ultra.exe
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
WPE collection (HxT)/WpeSpy.dll
Resource
win11-20240802-en
General
-
Target
WPE collection (HxT)/SetPriv.dll
-
Size
22KB
-
MD5
6ab821d0f4514ae54ba0386f4d9406d5
-
SHA1
6ab8b8a9b59d9ff1071e7c3c7261c40bfc6b4864
-
SHA256
025816bd1fa415fec72300db9cd3319a869dfa0beec23986547b25cdc8a47e9c
-
SHA512
2527d0aa6eacbb3f2b68b177d9221559f4e63c7c1b33ecfb7cadeeac5b2f9deafb55e80b10b2c2122d063e00feffa592afce91c01b461f3585b8d90fe65f1318
-
SSDEEP
384:W5OrhERIXJncR95wmWS6HiOdVUxN62lq0rMXv78WIf/c+CWXqslbOK+fcVD:xrhERyJncR9tWS6HiOdVUXFqCMXNIXxD
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2372-0-0x0000000010000000-0x0000000010011000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2372 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3476 wrote to memory of 2372 3476 rundll32.exe 81 PID 3476 wrote to memory of 2372 3476 rundll32.exe 81 PID 3476 wrote to memory of 2372 3476 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\WPE collection (HxT)\SetPriv.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\WPE collection (HxT)\SetPriv.dll",#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2372
-