Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 10:50

General

  • Target

    9f458556607cf619db63f7147e9b46ea132cd542baef6e9a88b012adf0d822e4.exe

  • Size

    250KB

  • MD5

    4e3551a05ae8766630458c952578d677

  • SHA1

    ad45e73b9139c293d2616a3293809c6e8072baca

  • SHA256

    9f458556607cf619db63f7147e9b46ea132cd542baef6e9a88b012adf0d822e4

  • SHA512

    22a461df0d4e030ba36c3e6c0cc652da4c09018e3a0af5e17dd2a0d37bb71e8f293d1faee5083ef49fd4e0329089a47e33f097e28102c154a6472e606f10876c

  • SSDEEP

    3072:MGOFLomQsQtM25LSF12LT8nsQqIbSC3IzSNGOsDGLCpIfMhlGV6T3A/tROoHniXb:KXxQtJ2FSBYr3gOrEhdT3A/tROoHLQ

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f458556607cf619db63f7147e9b46ea132cd542baef6e9a88b012adf0d822e4.exe
    "C:\Users\Admin\AppData\Local\Temp\9f458556607cf619db63f7147e9b46ea132cd542baef6e9a88b012adf0d822e4.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Modifies WinLogon
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4956-132-0x0000000000A40000-0x0000000000AA0000-memory.dmp

    Filesize

    384KB

  • memory/4956-133-0x0000000000400000-0x000000000049F000-memory.dmp

    Filesize

    636KB

  • memory/4956-134-0x0000000002280000-0x0000000002332000-memory.dmp

    Filesize

    712KB

  • memory/4956-135-0x0000000002920000-0x00000000029D8000-memory.dmp

    Filesize

    736KB

  • memory/4956-136-0x0000000000A40000-0x0000000000AA0000-memory.dmp

    Filesize

    384KB

  • memory/4956-137-0x0000000002920000-0x00000000029D8000-memory.dmp

    Filesize

    736KB