Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

27/12/2022, 14:34

221227-rxqn8afa54 10

27/12/2022, 14:34

221227-rxfh9afa52 10

25/12/2022, 11:46

221225-nxcwksee8w 10

Analysis

  • max time kernel
    45s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/12/2022, 14:34

General

  • Target

    1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe

  • Size

    1.0MB

  • MD5

    1a5e881a5197cdee0fd2be1af368198a

  • SHA1

    3ff94ebf7ed66aadafa66b28f01f3a4beeadb98c

  • SHA256

    1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2

  • SHA512

    8c75be3273a8d8b1043e3e4e2034cd00a8bb33c404ae2441619e16113b24723159a46a6fce4526ae31040e1bd3ee7368340ad7bbbb2fe4d0c9d15d78fdc4ffb2

  • SSDEEP

    12288:attzg2iNNvemxU2Uy49rF+mu3bk0RqV4Ef3JdselFDnw7Vu:QBg1vxUWcIrk0Rqf3Jd1FLIV

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe
    "C:\Users\Admin\AppData\Local\Temp\1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Users\Admin\AppData\Local\Temp\1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe
      "C:\Users\Admin\AppData\Local\Temp\1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe"
      2⤵
        PID:2008
      • C:\Users\Admin\AppData\Local\Temp\1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe
        "C:\Users\Admin\AppData\Local\Temp\1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe"
        2⤵
          PID:1176
        • C:\Users\Admin\AppData\Local\Temp\1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe
          "C:\Users\Admin\AppData\Local\Temp\1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe"
          2⤵
            PID:524
          • C:\Users\Admin\AppData\Local\Temp\1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe
            "C:\Users\Admin\AppData\Local\Temp\1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe"
            2⤵
              PID:564
            • C:\Users\Admin\AppData\Local\Temp\1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe
              "C:\Users\Admin\AppData\Local\Temp\1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe"
              2⤵
                PID:1060

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1944-54-0x0000000000380000-0x000000000048C000-memory.dmp

              Filesize

              1.0MB

            • memory/1944-55-0x0000000076D71000-0x0000000076D73000-memory.dmp

              Filesize

              8KB

            • memory/1944-56-0x00000000004D0000-0x00000000004E8000-memory.dmp

              Filesize

              96KB

            • memory/1944-57-0x0000000000570000-0x000000000057C000-memory.dmp

              Filesize

              48KB

            • memory/1944-58-0x0000000005C90000-0x0000000005D24000-memory.dmp

              Filesize

              592KB

            • memory/1944-59-0x0000000000820000-0x000000000085A000-memory.dmp

              Filesize

              232KB