Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2025, 17:46
Behavioral task
behavioral1
Sample
dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe
Resource
win10v2004-20241007-en
General
-
Target
dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe
-
Size
1.1MB
-
MD5
6fcabb0ce1ee56231558829f1f85b5ff
-
SHA1
46741615ba1b9d626c563704e438ac8ccb4e2f89
-
SHA256
dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263
-
SHA512
b3f5e3380aca7236f14a53c8072ce1e1ec10e455a9a8ef3fe5888f38bc5b86c51c2436f427723f03614a3321957bcc618b824cfa97c9ff3e77cda43cabaa66d2
-
SSDEEP
24576:w2UlQci3khFwLhaOUYo8N3ZbXBFO5ZDSiTbJ77:WGfaw1aOU/orFO5tV77
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2652 dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe"C:\Users\Admin\AppData\Local\Temp\dccd0abbeb66929c47ea9c8a9cdee473d558cf5b8c16434bb4eb603f51a6c263.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2652