Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21/04/2023, 06:06

General

  • Target

    DHL AWB INVOICE#20230419_PDF.exe

  • Size

    352KB

  • MD5

    283ef9caec72df7f3e3b3106caee7d4f

  • SHA1

    bf08f0afdd4c3c352325c8b694a85b95e36d8b5d

  • SHA256

    7730f4223c3153e22b6dc9cea1196610512aeb0b7c646107da7064b3e750af1e

  • SHA512

    6be10095bc38856fb200913a57d5adb5a4a060c24a23435e11d8ce93f4c6753038b8c5ddbd9ef4000c2c99de7a8970266356e3972f54e7e320e63cc1c2ceebbc

  • SSDEEP

    6144:xOnb0ddez+2IhZMMFtNzbfRlLC61vsIHkoqeJSnWLnlnXODL90FnDn0OPyR4UO0y:wnb0dd0+dhZtFFTsIGWLnlnXODx0FnDZ

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DHL AWB INVOICE#20230419_PDF.exe
    "C:\Users\Admin\AppData\Local\Temp\DHL AWB INVOICE#20230419_PDF.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:924

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\Local\Temp\Tar2AE0.tmp

    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • memory/924-54-0x0000000001120000-0x000000000117E000-memory.dmp

    Filesize

    376KB

  • memory/924-55-0x0000000004E10000-0x0000000004E50000-memory.dmp

    Filesize

    256KB

  • memory/924-525-0x0000000004E10000-0x0000000004E50000-memory.dmp

    Filesize

    256KB