Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2022, 13:42

General

  • Target

    415406b919150e88f307f8fae2df5871d64d9cf0e59efd20a0ec1d23ca66ac1a.exe

  • Size

    173KB

  • MD5

    651bad77153fc1be453c8ded7e31b6f0

  • SHA1

    5d503ee8f88ca8103cc9203937685509f172a8c8

  • SHA256

    415406b919150e88f307f8fae2df5871d64d9cf0e59efd20a0ec1d23ca66ac1a

  • SHA512

    0c56b6bba5f93ece5eb278c66f1f687d2b86cae1a49da7ccf66462efdb77665f2d23cb8e56e0e943a728800c77554ae67f9d20c7b5f3132f09e645c315e61ec2

  • SSDEEP

    1536:WRUJnFahNLjo/6Cg+TyKWtv/yHL76NmWd/PF+vtqwIA7WFccR1JsFwcPYmevs05C:+waNLsHvTyKWNyX67dNstF7SxkUMp

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\415406b919150e88f307f8fae2df5871d64d9cf0e59efd20a0ec1d23ca66ac1a.exe
    "C:\Users\Admin\AppData\Local\Temp\415406b919150e88f307f8fae2df5871d64d9cf0e59efd20a0ec1d23ca66ac1a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4036
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
      dw20.exe -x -s 804
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:1252

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4036-133-0x0000000075420000-0x00000000759D1000-memory.dmp

    Filesize

    5.7MB

  • memory/4036-134-0x0000000075420000-0x00000000759D1000-memory.dmp

    Filesize

    5.7MB