Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 23:41
Static task
static1
Behavioral task
behavioral1
Sample
e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe
Resource
win10v2004-20240802-en
General
-
Target
e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe
-
Size
4.7MB
-
MD5
222ee1a974f0ae6ef429b3bdb245c920
-
SHA1
874d778154ce6310a315b31b099ffdece92a1952
-
SHA256
e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911
-
SHA512
ceadfb4c5b0487c3673fe0ace0d0578526322888170016302112495a3d9c499e7c09f7e763d1d8f732570a886af5256361d1e3e1d7793c34b9131c76d3cb912e
-
SSDEEP
49152:IafhTfkriTUFKk6zX2ikvlIn796cChsQ6hjohgfaKt:nUf6X2ikvlInOI6gV
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/292-8-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-10-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-11-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-13-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-16-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-18-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-14-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-12-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-35-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-53-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-25-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-56-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-51-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-49-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-47-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-45-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-43-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-41-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-39-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-37-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-33-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-31-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-29-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-27-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-22-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-20-0x0000000002810000-0x000000000284E000-memory.dmp upx behavioral1/memory/292-58-0x0000000002810000-0x000000000284E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: 1 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeCreateTokenPrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeAssignPrimaryTokenPrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeLockMemoryPrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeIncreaseQuotaPrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeMachineAccountPrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeTcbPrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeSecurityPrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeTakeOwnershipPrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeLoadDriverPrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeSystemProfilePrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeSystemtimePrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeProfSingleProcessPrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeIncBasePriorityPrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeCreatePagefilePrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeCreatePermanentPrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeBackupPrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeRestorePrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeShutdownPrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeDebugPrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeAuditPrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeSystemEnvironmentPrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeChangeNotifyPrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeRemoteShutdownPrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeUndockPrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeSyncAgentPrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeEnableDelegationPrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeManageVolumePrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeImpersonatePrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: SeCreateGlobalPrivilege 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: 31 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: 32 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: 33 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: 34 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: 35 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: 36 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: 37 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: 38 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: 39 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: 40 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: 41 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: 42 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: 43 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: 44 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: 45 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: 46 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: 47 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe Token: 48 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe 292 e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe"C:\Users\Admin\AppData\Local\Temp\e9f308b1fbfcbf0cd83e4ba97efbc6d9ec70307cb506d013818da1598053d911.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:292