Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 03:55

General

  • Target

    4df1f3766b49a92df4e7b1b944fdc0f16a4e2ea2b3bd6940113d3abe76646946.exe

  • Size

    308KB

  • MD5

    5bcbe6eb71966fa3af1cbb7b5fee13df

  • SHA1

    18a84bd0b3ae6fb515aad29028df27d3bb062538

  • SHA256

    4df1f3766b49a92df4e7b1b944fdc0f16a4e2ea2b3bd6940113d3abe76646946

  • SHA512

    a6a4f93d567cd9f9ef0e0b5179333713eb1468e04d3393683478e0cee52d770505a30322ff4753228805f78cf846c4113dac08d761bfb2e41ddeccadfb0383b3

  • SSDEEP

    6144:qB4qml4l+DKNh4KEYJOmpJ4DVPuHO4WcAoyLb:qBz245hPJxpyDVPwNWlb

Score
6/10

Malware Config

Signatures

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4df1f3766b49a92df4e7b1b944fdc0f16a4e2ea2b3bd6940113d3abe76646946.exe
    "C:\Users\Admin\AppData\Local\Temp\4df1f3766b49a92df4e7b1b944fdc0f16a4e2ea2b3bd6940113d3abe76646946.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:1020

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1020-133-0x0000000000920000-0x000000000094F000-memory.dmp

    Filesize

    188KB

  • memory/1020-137-0x0000000005F30000-0x0000000005F57000-memory.dmp

    Filesize

    156KB