Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    173s
  • max time network
    213s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2022, 14:57

General

  • Target

    30eb4726c40980d837ffd32e710b61e49135235a12ad2afda33b6ebf60325ee9.exe

  • Size

    503KB

  • MD5

    bd50bee02d682a7db641de433a9240ac

  • SHA1

    ba20a924207904590c14e4b4dfdceca2c8fab5a5

  • SHA256

    30eb4726c40980d837ffd32e710b61e49135235a12ad2afda33b6ebf60325ee9

  • SHA512

    5d7efee9ead8cff6e016e684f0bf65ec2fc9dbc3d9058e9827ac7dcf66f7fc8deea7eeeb8e39b2f4710579fe029f3d50d733b50e5be9c847752f4f91888645e8

  • SSDEEP

    12288:lFbMAxatT0AkpESBKewcNsw4sN14CJnX+Y88oRkWn7iYH2/m9A4s7i:Jt9XXYuYWrdi

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30eb4726c40980d837ffd32e710b61e49135235a12ad2afda33b6ebf60325ee9.exe
    "C:\Users\Admin\AppData\Local\Temp\30eb4726c40980d837ffd32e710b61e49135235a12ad2afda33b6ebf60325ee9.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4804
    • \??\c:\windows\system32\filehistory.exe
      c:\windows\system32\filehistory.exe
      2⤵
      • Checks processor information in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1544

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1544-138-0x00007FFF7B6C0000-0x00007FFF7C181000-memory.dmp

    Filesize

    10.8MB

  • memory/1544-144-0x00000269FDA80000-0x00000269FDAF6000-memory.dmp

    Filesize

    472KB

  • memory/1544-145-0x00000269E4000000-0x00000269E401E000-memory.dmp

    Filesize

    120KB

  • memory/1544-135-0x0000000140000000-0x0000000140072000-memory.dmp

    Filesize

    456KB

  • memory/1544-139-0x00000269E3FD0000-0x00000269E3FF2000-memory.dmp

    Filesize

    136KB

  • memory/1544-140-0x00007FFF7B6C0000-0x00007FFF7C181000-memory.dmp

    Filesize

    10.8MB

  • memory/1544-143-0x00000269FD9B0000-0x00000269FD9FA000-memory.dmp

    Filesize

    296KB

  • memory/1544-142-0x0000026980060000-0x0000026980081000-memory.dmp

    Filesize

    132KB

  • memory/1544-141-0x0000026980000000-0x0000026980015000-memory.dmp

    Filesize

    84KB

  • memory/4804-133-0x00007FFF7B6C0000-0x00007FFF7C181000-memory.dmp

    Filesize

    10.8MB

  • memory/4804-132-0x000001E617AF0000-0x000001E617B72000-memory.dmp

    Filesize

    520KB

  • memory/4804-137-0x00007FFF7B6C0000-0x00007FFF7C181000-memory.dmp

    Filesize

    10.8MB

  • memory/4804-134-0x00007FFF7B6C0000-0x00007FFF7C181000-memory.dmp

    Filesize

    10.8MB