Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
30/01/2025, 00:56
Behavioral task
behavioral1
Sample
2025-01-29_18c090b6b5b5861887bb75ecd45bb18b_ismagent_ryuk_sliver.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2025-01-29_18c090b6b5b5861887bb75ecd45bb18b_ismagent_ryuk_sliver.exe
Resource
win10v2004-20250129-en
General
-
Target
2025-01-29_18c090b6b5b5861887bb75ecd45bb18b_ismagent_ryuk_sliver.exe
-
Size
3.3MB
-
MD5
18c090b6b5b5861887bb75ecd45bb18b
-
SHA1
2762d2c34229460644adfff50468218b57b3d82c
-
SHA256
23ec15cb4dab1061ab86df7e085933449d5f8ea43408b11d3df13c18dcb03cd8
-
SHA512
6f502cb005ad70b290ea857896e2e6e7e6b22e5452a43be11034d069c206cb0072eaaef720072472f367fde34a0d8ede566c51d82a31c9b4f9b699212279644c
-
SSDEEP
49152:cX3YnLOQYsZfQ74C6SkgSbXP31+frjUYuHi7nT8poTMFvfuJ1kZ7NrjHQe85Q/:clRsZ47/QXoHUOfAoj1x6/
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3720 wmic.exe Token: SeSecurityPrivilege 3720 wmic.exe Token: SeTakeOwnershipPrivilege 3720 wmic.exe Token: SeLoadDriverPrivilege 3720 wmic.exe Token: SeSystemProfilePrivilege 3720 wmic.exe Token: SeSystemtimePrivilege 3720 wmic.exe Token: SeProfSingleProcessPrivilege 3720 wmic.exe Token: SeIncBasePriorityPrivilege 3720 wmic.exe Token: SeCreatePagefilePrivilege 3720 wmic.exe Token: SeBackupPrivilege 3720 wmic.exe Token: SeRestorePrivilege 3720 wmic.exe Token: SeShutdownPrivilege 3720 wmic.exe Token: SeDebugPrivilege 3720 wmic.exe Token: SeSystemEnvironmentPrivilege 3720 wmic.exe Token: SeRemoteShutdownPrivilege 3720 wmic.exe Token: SeUndockPrivilege 3720 wmic.exe Token: SeManageVolumePrivilege 3720 wmic.exe Token: 33 3720 wmic.exe Token: 34 3720 wmic.exe Token: 35 3720 wmic.exe Token: 36 3720 wmic.exe Token: SeIncreaseQuotaPrivilege 3720 wmic.exe Token: SeSecurityPrivilege 3720 wmic.exe Token: SeTakeOwnershipPrivilege 3720 wmic.exe Token: SeLoadDriverPrivilege 3720 wmic.exe Token: SeSystemProfilePrivilege 3720 wmic.exe Token: SeSystemtimePrivilege 3720 wmic.exe Token: SeProfSingleProcessPrivilege 3720 wmic.exe Token: SeIncBasePriorityPrivilege 3720 wmic.exe Token: SeCreatePagefilePrivilege 3720 wmic.exe Token: SeBackupPrivilege 3720 wmic.exe Token: SeRestorePrivilege 3720 wmic.exe Token: SeShutdownPrivilege 3720 wmic.exe Token: SeDebugPrivilege 3720 wmic.exe Token: SeSystemEnvironmentPrivilege 3720 wmic.exe Token: SeRemoteShutdownPrivilege 3720 wmic.exe Token: SeUndockPrivilege 3720 wmic.exe Token: SeManageVolumePrivilege 3720 wmic.exe Token: 33 3720 wmic.exe Token: 34 3720 wmic.exe Token: 35 3720 wmic.exe Token: 36 3720 wmic.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5088 wrote to memory of 3720 5088 2025-01-29_18c090b6b5b5861887bb75ecd45bb18b_ismagent_ryuk_sliver.exe 81 PID 5088 wrote to memory of 3720 5088 2025-01-29_18c090b6b5b5861887bb75ecd45bb18b_ismagent_ryuk_sliver.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-29_18c090b6b5b5861887bb75ecd45bb18b_ismagent_ryuk_sliver.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-29_18c090b6b5b5861887bb75ecd45bb18b_ismagent_ryuk_sliver.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\system32\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3720
-