Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    179s
  • max time network
    201s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/11/2022, 09:49

General

  • Target

    805eb65227383fc406fa7372939a37ad9aa060c755a1d38de21d59d13a0d95c6.exe

  • Size

    122KB

  • MD5

    e4349530ee4b56374b9804963f468153

  • SHA1

    3fcdac5e4ad7922d0e873977a8ad38a4697ef1df

  • SHA256

    805eb65227383fc406fa7372939a37ad9aa060c755a1d38de21d59d13a0d95c6

  • SHA512

    9fb5aa6dc1545621dc2fc61052b9f8791f8147fbdce90e9057a253dbab42832a6b27ab15310e09b9dd083f7c6dbce59519f6d9b5642135bf4f2a6ad49a1f82ee

  • SSDEEP

    1536:0ZhgyKBh9HfvC66TRpI0A3wPcwXcRueyPxa9y+vjbe3fMa4rbwIyKmVfB4nTEo+m:HychVg7DPPiy+vuP/qUIyKkfBRbg

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\805eb65227383fc406fa7372939a37ad9aa060c755a1d38de21d59d13a0d95c6.exe
    "C:\Users\Admin\AppData\Local\Temp\805eb65227383fc406fa7372939a37ad9aa060c755a1d38de21d59d13a0d95c6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\AppData\Local\Temp\805eb65227383fc406fa7372939a37ad9aa060c755a1d38de21d59d13a0d95c6.exe
      "C:\Users\Admin\AppData\Local\Temp\805eb65227383fc406fa7372939a37ad9aa060c755a1d38de21d59d13a0d95c6.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      PID:952

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/952-134-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/952-136-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/952-137-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/3048-132-0x0000000000760000-0x0000000000767000-memory.dmp

    Filesize

    28KB