Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    50s
  • max time network
    53s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/04/2023, 17:05

General

  • Target

    @bat_crack.exe

  • Size

    29.5MB

  • MD5

    599cf4007855e6441cffb3e575d487ac

  • SHA1

    82aa0d18edd56836b194ad461bf11d6ac4125c28

  • SHA256

    5e1bfe969ed1030a82dd607acfb0aa116d95ee2ff8d160dcd783d0c30e062e09

  • SHA512

    a7fead6768330b2114beab5afc755418419725430a3da17132d7f5e942e0d48c59365b0e69e33e57cf0f9e115f2ec59f934cfe83b99eea79ec8a480d15aa3cc6

  • SSDEEP

    786432:4+xN5xHIskKdcR3aiaBhrh/gn1465WrI9/yR:3xVoadcBaL9c142W89/e

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\@bat_crack.exe
    "C:\Users\Admin\AppData\Local\Temp\@bat_crack.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2520

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2520-133-0x0000000005830000-0x0000000005831000-memory.dmp

    Filesize

    4KB

  • memory/2520-134-0x0000000005840000-0x0000000005841000-memory.dmp

    Filesize

    4KB

  • memory/2520-135-0x00000000059E0000-0x00000000059E1000-memory.dmp

    Filesize

    4KB

  • memory/2520-136-0x0000000005A00000-0x0000000005A01000-memory.dmp

    Filesize

    4KB

  • memory/2520-137-0x0000000005A10000-0x0000000005A11000-memory.dmp

    Filesize

    4KB

  • memory/2520-138-0x0000000005A20000-0x0000000005A21000-memory.dmp

    Filesize

    4KB

  • memory/2520-139-0x0000000005A30000-0x0000000005A31000-memory.dmp

    Filesize

    4KB

  • memory/2520-140-0x00000000074E0000-0x00000000074E1000-memory.dmp

    Filesize

    4KB

  • memory/2520-141-0x0000000000400000-0x000000000575E000-memory.dmp

    Filesize

    83.4MB