Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    87s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/01/2023, 05:31

General

  • Target

    file.exe

  • Size

    444KB

  • MD5

    ab5812027899dce080507f3dba2c9589

  • SHA1

    ee5b661243f4932d2e56c5c2e359259306b46f18

  • SHA256

    d7a50adf0a325143997529545a82e03451042578a6e09a5b514a90a25ea0aa35

  • SHA512

    07cb4b9eb71166fb83a34ec98afa1af922b31cf9c7edaa00ca7036580c8117cf122e6fe6dac4128408f1908040f1b34277d7a427656cf97a3bfca5a481f15a1c

  • SSDEEP

    12288:485qx2nHZJGTVMshuTBaOr4m36hKbEvZTbo:4SiwTS7M48RbEvlb

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4612
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4612 -s 1256
      2⤵
      • Program crash
      PID:2032
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4612 -ip 4612
    1⤵
      PID:1420

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4612-132-0x00000000074A0000-0x0000000007A44000-memory.dmp

      Filesize

      5.6MB

    • memory/4612-133-0x0000000002DA7000-0x0000000002DDD000-memory.dmp

      Filesize

      216KB

    • memory/4612-134-0x0000000002D00000-0x0000000002D59000-memory.dmp

      Filesize

      356KB

    • memory/4612-135-0x0000000000400000-0x0000000002C61000-memory.dmp

      Filesize

      40.4MB

    • memory/4612-136-0x0000000007A50000-0x0000000008068000-memory.dmp

      Filesize

      6.1MB

    • memory/4612-137-0x0000000007470000-0x0000000007482000-memory.dmp

      Filesize

      72KB

    • memory/4612-138-0x0000000008070000-0x000000000817A000-memory.dmp

      Filesize

      1.0MB

    • memory/4612-139-0x0000000008180000-0x00000000081BC000-memory.dmp

      Filesize

      240KB

    • memory/4612-140-0x0000000008490000-0x0000000008522000-memory.dmp

      Filesize

      584KB

    • memory/4612-141-0x0000000008530000-0x0000000008596000-memory.dmp

      Filesize

      408KB

    • memory/4612-142-0x0000000008D60000-0x0000000008F22000-memory.dmp

      Filesize

      1.8MB

    • memory/4612-143-0x0000000008F30000-0x000000000945C000-memory.dmp

      Filesize

      5.2MB

    • memory/4612-144-0x0000000009550000-0x00000000095C6000-memory.dmp

      Filesize

      472KB

    • memory/4612-145-0x0000000009610000-0x000000000962E000-memory.dmp

      Filesize

      120KB

    • memory/4612-146-0x0000000002DA7000-0x0000000002DDD000-memory.dmp

      Filesize

      216KB

    • memory/4612-147-0x0000000000400000-0x0000000002C61000-memory.dmp

      Filesize

      40.4MB