Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
ce69ed5861a0df67d984b0d6c0e79d40N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce69ed5861a0df67d984b0d6c0e79d40N.exe
Resource
win10v2004-20240802-en
General
-
Target
ce69ed5861a0df67d984b0d6c0e79d40N.exe
-
Size
1.4MB
-
MD5
ce69ed5861a0df67d984b0d6c0e79d40
-
SHA1
bdce8eec631d1da4c677f33d01a81773077b620d
-
SHA256
a3c7834dbe55c9fb75499d80b3b1f158764ec9a9ce2bd4e04863a82b3cd7f236
-
SHA512
757e40ca5739ede6b6844e6b640ea267e862fb1b0b8714cc1fa85810dea926bb32eadfc01ae3dad981734507bc8f1ac212f9a291cebf786cb05c96324dd20ff1
-
SSDEEP
24576:8a3W/e+lpSuCVebLJ8Ep2wv5AI/qZT+2fl+PIetD41G5/h7srTr4Y:8BlHVCw80vvSIyVtYPI84wh72l
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2864 2968 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce69ed5861a0df67d984b0d6c0e79d40N.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe Token: SeSecurityPrivilege 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe Token: SeTakeOwnershipPrivilege 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe Token: SeLoadDriverPrivilege 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe Token: SeSystemProfilePrivilege 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe Token: SeSystemtimePrivilege 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe Token: SeProfSingleProcessPrivilege 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe Token: SeIncBasePriorityPrivilege 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe Token: SeCreatePagefilePrivilege 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe Token: SeBackupPrivilege 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe Token: SeRestorePrivilege 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe Token: SeShutdownPrivilege 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe Token: SeDebugPrivilege 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe Token: SeSystemEnvironmentPrivilege 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe Token: SeChangeNotifyPrivilege 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe Token: SeRemoteShutdownPrivilege 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe Token: SeUndockPrivilege 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe Token: SeManageVolumePrivilege 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe Token: SeImpersonatePrivilege 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe Token: SeCreateGlobalPrivilege 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe Token: 33 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe Token: 34 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe Token: 35 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2864 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe 30 PID 2968 wrote to memory of 2864 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe 30 PID 2968 wrote to memory of 2864 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe 30 PID 2968 wrote to memory of 2864 2968 ce69ed5861a0df67d984b0d6c0e79d40N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce69ed5861a0df67d984b0d6c0e79d40N.exe"C:\Users\Admin\AppData\Local\Temp\ce69ed5861a0df67d984b0d6c0e79d40N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 3722⤵
- Program crash
PID:2864
-