Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    196s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2022, 09:49

General

  • Target

    805eb65227383fc406fa7372939a37ad9aa060c755a1d38de21d59d13a0d95c6.exe

  • Size

    122KB

  • MD5

    e4349530ee4b56374b9804963f468153

  • SHA1

    3fcdac5e4ad7922d0e873977a8ad38a4697ef1df

  • SHA256

    805eb65227383fc406fa7372939a37ad9aa060c755a1d38de21d59d13a0d95c6

  • SHA512

    9fb5aa6dc1545621dc2fc61052b9f8791f8147fbdce90e9057a253dbab42832a6b27ab15310e09b9dd083f7c6dbce59519f6d9b5642135bf4f2a6ad49a1f82ee

  • SSDEEP

    1536:0ZhgyKBh9HfvC66TRpI0A3wPcwXcRueyPxa9y+vjbe3fMa4rbwIyKmVfB4nTEo+m:HychVg7DPPiy+vuP/qUIyKkfBRbg

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\805eb65227383fc406fa7372939a37ad9aa060c755a1d38de21d59d13a0d95c6.exe
    "C:\Users\Admin\AppData\Local\Temp\805eb65227383fc406fa7372939a37ad9aa060c755a1d38de21d59d13a0d95c6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1272
    • C:\Users\Admin\AppData\Local\Temp\805eb65227383fc406fa7372939a37ad9aa060c755a1d38de21d59d13a0d95c6.exe
      "C:\Users\Admin\AppData\Local\Temp\805eb65227383fc406fa7372939a37ad9aa060c755a1d38de21d59d13a0d95c6.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      PID:968

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/968-54-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/968-55-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/968-57-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/968-59-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/968-60-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/968-64-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/968-65-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1272-62-0x00000000003B0000-0x00000000003B7000-memory.dmp

    Filesize

    28KB