Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    203s
  • max time network
    195s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 02:01

General

  • Target

    434d8d54d039e42c4f16ea47a8735a3c0b922d970d7d2a402ffc28329a07daa5.exe

  • Size

    376KB

  • MD5

    cdf297231e23d96a030d0f9e0e2af590

  • SHA1

    083b9a924b714324c443230d124609cfa812bfc8

  • SHA256

    434d8d54d039e42c4f16ea47a8735a3c0b922d970d7d2a402ffc28329a07daa5

  • SHA512

    7d40adfd1d677baf5180cd08ee350df1ca623043f65ee85cbfaa15ee0166013a97336c9779b3c4ac42159a536172d2821ec22a0f044b1ac534d120240db1c2b7

  • SSDEEP

    6144:i1toUIGHWDGjv6wllU8jHIYNq+MFTW2k1Q0Era4on8DsUL9HcK:6oUpW65lU8jztMFTW2+6+58DTz

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:620
    • C:\Users\Admin\AppData\Local\Temp\434d8d54d039e42c4f16ea47a8735a3c0b922d970d7d2a402ffc28329a07daa5.exe
      "C:\Users\Admin\AppData\Local\Temp\434d8d54d039e42c4f16ea47a8735a3c0b922d970d7d2a402ffc28329a07daa5.exe"
      1⤵
      • Modifies WinLogon for persistence
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:476

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/476-132-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/476-133-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/476-134-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/620-139-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/620-144-0x00000000272C0000-0x00000000272E5000-memory.dmp

      Filesize

      148KB

    • memory/620-149-0x00000000272F0000-0x0000000027315000-memory.dmp

      Filesize

      148KB

    • memory/620-154-0x0000000027320000-0x0000000027345000-memory.dmp

      Filesize

      148KB

    • memory/620-159-0x0000000027350000-0x0000000027375000-memory.dmp

      Filesize

      148KB

    • memory/620-164-0x0000000027380000-0x00000000273A5000-memory.dmp

      Filesize

      148KB

    • memory/620-169-0x00000000273B0000-0x00000000273D5000-memory.dmp

      Filesize

      148KB

    • memory/620-174-0x00000000273E0000-0x0000000027405000-memory.dmp

      Filesize

      148KB

    • memory/620-179-0x0000000027410000-0x0000000027435000-memory.dmp

      Filesize

      148KB

    • memory/620-184-0x0000000027440000-0x0000000027465000-memory.dmp

      Filesize

      148KB

    • memory/620-189-0x0000000027470000-0x0000000027495000-memory.dmp

      Filesize

      148KB

    • memory/620-194-0x00000000274A0000-0x00000000274C5000-memory.dmp

      Filesize

      148KB

    • memory/620-199-0x00000000274D0000-0x00000000274F5000-memory.dmp

      Filesize

      148KB

    • memory/620-204-0x0000000027500000-0x0000000027525000-memory.dmp

      Filesize

      148KB

    • memory/620-209-0x0000000027530000-0x0000000027555000-memory.dmp

      Filesize

      148KB

    • memory/620-214-0x0000000027560000-0x0000000027585000-memory.dmp

      Filesize

      148KB

    • memory/620-219-0x0000000027590000-0x00000000275B5000-memory.dmp

      Filesize

      148KB

    • memory/620-224-0x00000000275C0000-0x00000000275E5000-memory.dmp

      Filesize

      148KB

    • memory/620-229-0x00000000275F0000-0x0000000027615000-memory.dmp

      Filesize

      148KB