Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    207s
  • max time network
    210s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 02:09

General

  • Target

    99f281b1384a8bb8b679064f3a9b6f26daa5e5d8a54a9452262f60c41a2175f8.exe

  • Size

    367KB

  • MD5

    421b240301bb855687ffcade44017435

  • SHA1

    6e34447474f8d061c6824ef08b41e01385a25360

  • SHA256

    99f281b1384a8bb8b679064f3a9b6f26daa5e5d8a54a9452262f60c41a2175f8

  • SHA512

    6e98e6acf6901fee689b26d108ee72bb1dc7a58cae3f7d2a99664ca409a1f6174575503857802f8d8c95fdfd73f265617fa971a0f3cbafa6aedf860ccf526245

  • SSDEEP

    6144:Z0pqlAPM9FURr7mmS6PPL6RgoHjoyXgq48ct8Yc8396qyti4:ZRCk9gHmH6WRloKCyYVFyt/

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:616
    • C:\Users\Admin\AppData\Local\Temp\99f281b1384a8bb8b679064f3a9b6f26daa5e5d8a54a9452262f60c41a2175f8.exe
      "C:\Users\Admin\AppData\Local\Temp\99f281b1384a8bb8b679064f3a9b6f26daa5e5d8a54a9452262f60c41a2175f8.exe"
      1⤵
      • Modifies WinLogon for persistence
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4400

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/616-178-0x000000003B780000-0x000000003B799000-memory.dmp

      Filesize

      100KB

    • memory/616-183-0x000000003B7A0000-0x000000003B7B9000-memory.dmp

      Filesize

      100KB

    • memory/616-138-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/616-143-0x000000003B6A0000-0x000000003B6B9000-memory.dmp

      Filesize

      100KB

    • memory/616-148-0x000000003B6C0000-0x000000003B6D9000-memory.dmp

      Filesize

      100KB

    • memory/616-153-0x000000003B6E0000-0x000000003B6F9000-memory.dmp

      Filesize

      100KB

    • memory/616-158-0x000000003B700000-0x000000003B719000-memory.dmp

      Filesize

      100KB

    • memory/616-163-0x000000003B720000-0x000000003B739000-memory.dmp

      Filesize

      100KB

    • memory/616-168-0x000000003B740000-0x000000003B759000-memory.dmp

      Filesize

      100KB

    • memory/616-173-0x000000003B760000-0x000000003B779000-memory.dmp

      Filesize

      100KB

    • memory/616-228-0x000000003B8C0000-0x000000003B8D9000-memory.dmp

      Filesize

      100KB

    • memory/616-188-0x000000003B7C0000-0x000000003B7D9000-memory.dmp

      Filesize

      100KB

    • memory/616-223-0x000000003B8A0000-0x000000003B8B9000-memory.dmp

      Filesize

      100KB

    • memory/616-193-0x000000003B7E0000-0x000000003B7F9000-memory.dmp

      Filesize

      100KB

    • memory/616-198-0x000000003B800000-0x000000003B819000-memory.dmp

      Filesize

      100KB

    • memory/616-203-0x000000003B820000-0x000000003B839000-memory.dmp

      Filesize

      100KB

    • memory/616-208-0x000000003B840000-0x000000003B859000-memory.dmp

      Filesize

      100KB

    • memory/616-213-0x000000003B860000-0x000000003B879000-memory.dmp

      Filesize

      100KB

    • memory/616-218-0x000000003B880000-0x000000003B899000-memory.dmp

      Filesize

      100KB

    • memory/4400-132-0x00000000005C0000-0x00000000005D2000-memory.dmp

      Filesize

      72KB

    • memory/4400-133-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB