Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    45s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2022, 10:56 UTC

General

  • Target

    b744b6b1707a87ee67b6084c913c573559b9180f8500998c0cf23ab93c6672f7.exe

  • Size

    65KB

  • MD5

    42b7c72c3bfd9ac90476f28efbf70030

  • SHA1

    b47824fa7f7ff8dbd74504652527ea721a4f7a18

  • SHA256

    b744b6b1707a87ee67b6084c913c573559b9180f8500998c0cf23ab93c6672f7

  • SHA512

    52401e6acd23b164fae6c1aa636bf45cdd70d0f8084ccfe02dbba562aa19c5c4c2b2b19db54b65cc46a27ee363832051eb7f9c5226c54b6eea9cd6b6d1082845

  • SSDEEP

    1536:pJyyBbcGtPK+uNd8UIMyGQWN+cwsTAEEnirIi:jyyBbcGtC+uNd8r3GxweJEn7i

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\wininit.exe
    wininit.exe
    1⤵
      PID:368
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        2⤵
          PID:472
        • C:\Windows\system32\services.exe
          C:\Windows\system32\services.exe
          2⤵
            PID:464
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
              3⤵
                PID:808
                • C:\Windows\system32\Dwm.exe
                  "C:\Windows\system32\Dwm.exe"
                  4⤵
                    PID:1244
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                  3⤵
                    PID:1048
                  • C:\Windows\system32\sppsvc.exe
                    C:\Windows\system32\sppsvc.exe
                    3⤵
                      PID:964
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                      3⤵
                        PID:976
                      • C:\Windows\system32\taskhost.exe
                        "taskhost.exe"
                        3⤵
                          PID:1160
                        • C:\Windows\System32\spoolsv.exe
                          C:\Windows\System32\spoolsv.exe
                          3⤵
                            PID:288
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k NetworkService
                            3⤵
                              PID:300
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k netsvcs
                              3⤵
                                PID:868
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService
                                3⤵
                                  PID:836
                                • C:\Windows\System32\svchost.exe
                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                                  3⤵
                                    PID:748
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k RPCSS
                                    3⤵
                                      PID:672
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k DcomLaunch
                                      3⤵
                                        PID:592
                                    • C:\Windows\system32\lsm.exe
                                      C:\Windows\system32\lsm.exe
                                      2⤵
                                        PID:480
                                    • C:\Windows\system32\winlogon.exe
                                      winlogon.exe
                                      1⤵
                                        PID:416
                                      • C:\Windows\system32\csrss.exe
                                        %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
                                        1⤵
                                          PID:380
                                          • C:\Windows\system32\conhost.exe
                                            \??\C:\Windows\system32\conhost.exe "-6612861801776078130-1517057647-1227085620-11675263161608614405351401461-168653185"
                                            2⤵
                                              PID:900
                                          • C:\Windows\Explorer.EXE
                                            C:\Windows\Explorer.EXE
                                            1⤵
                                              PID:1284
                                              • C:\Users\Admin\AppData\Local\Temp\b744b6b1707a87ee67b6084c913c573559b9180f8500998c0cf23ab93c6672f7.exe
                                                "C:\Users\Admin\AppData\Local\Temp\b744b6b1707a87ee67b6084c913c573559b9180f8500998c0cf23ab93c6672f7.exe"
                                                2⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious behavior: MapViewOfSection
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of WriteProcessMemory
                                                PID:1224
                                            • \\?\C:\Windows\system32\wbem\WMIADAP.EXE
                                              wmiadap.exe /F /T /R
                                              1⤵
                                                PID:1964

                                              Network

                                              MITRE ATT&CK Matrix

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • memory/1224-54-0x0000000001000000-0x0000000001019000-memory.dmp

                                                Filesize

                                                100KB

                                              We care about your privacy.

                                              This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.