Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 04:32

General

  • Target

    9e1be7ed6bbb44987b14d343ed97ee60efd046dbe865d96807ffc848c5b486ee.exe

  • Size

    7KB

  • MD5

    77c313c00bcc62a80e4b59c1e058e19e

  • SHA1

    9dc05b4793a78b1b761003e5e6f96dd52123ebba

  • SHA256

    9e1be7ed6bbb44987b14d343ed97ee60efd046dbe865d96807ffc848c5b486ee

  • SHA512

    53765f2a5cdb6ad845d35d5f37f3a8805fe04108d1cafd0a8000a0662b4df299079d0771ee88b0a04f0d6ec20a1a60fad13577df073c77f5312106161182ffee

  • SSDEEP

    192:mgewIMQFsTjsuESvWV5nlYJLTLT5kQDYZKFnOVK:DeiQFsIkWwfLT5rDYZKD

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e1be7ed6bbb44987b14d343ed97ee60efd046dbe865d96807ffc848c5b486ee.exe
    "C:\Users\Admin\AppData\Local\Temp\9e1be7ed6bbb44987b14d343ed97ee60efd046dbe865d96807ffc848c5b486ee.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1180

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1180-54-0x0000000075FE1000-0x0000000075FE3000-memory.dmp

    Filesize

    8KB

  • memory/1180-55-0x0000000074610000-0x0000000074BBB000-memory.dmp

    Filesize

    5.7MB

  • memory/1180-56-0x0000000074610000-0x0000000074BBB000-memory.dmp

    Filesize

    5.7MB