Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    101s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 11:53

General

  • Target

    file.exe

  • Size

    395KB

  • MD5

    59b3e89f94ba50447a1b4c4029d05544

  • SHA1

    10d7cc62bfcfd793615283b5036c2a965cd7145b

  • SHA256

    c8316c6f743acbc94875145b118ec10534cb8296c808c1e14c46cb2dd662fd57

  • SHA512

    9d88770bbb26752038e555967c13d49aab3ee78f40af5a23169b6483ad7889829dedb4b8b41be740b078abdbe9a7f20295e64a9b8e8def954f80ee419024595f

  • SSDEEP

    6144:QeyhUkJjYezNI38mHi5eo+O/q21/jDENbIFz8vpqygYK:BbkJj4C2O/FURcEK

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4672
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 1584
      2⤵
      • Program crash
      PID:3144
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4672 -ip 4672
    1⤵
      PID:732

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4672-134-0x0000000004DC0000-0x0000000005364000-memory.dmp

      Filesize

      5.6MB

    • memory/4672-135-0x0000000000830000-0x000000000086E000-memory.dmp

      Filesize

      248KB

    • memory/4672-137-0x00000000026D0000-0x00000000026E0000-memory.dmp

      Filesize

      64KB

    • memory/4672-136-0x00000000026D0000-0x00000000026E0000-memory.dmp

      Filesize

      64KB

    • memory/4672-138-0x0000000007860000-0x0000000007E78000-memory.dmp

      Filesize

      6.1MB

    • memory/4672-139-0x0000000007F10000-0x0000000007F22000-memory.dmp

      Filesize

      72KB

    • memory/4672-140-0x0000000007F30000-0x000000000803A000-memory.dmp

      Filesize

      1.0MB

    • memory/4672-141-0x0000000008040000-0x000000000807C000-memory.dmp

      Filesize

      240KB

    • memory/4672-142-0x00000000026D0000-0x00000000026E0000-memory.dmp

      Filesize

      64KB

    • memory/4672-143-0x0000000008350000-0x00000000083B6000-memory.dmp

      Filesize

      408KB

    • memory/4672-144-0x00000000089F0000-0x0000000008A82000-memory.dmp

      Filesize

      584KB

    • memory/4672-145-0x0000000008BD0000-0x0000000008C46000-memory.dmp

      Filesize

      472KB

    • memory/4672-146-0x0000000008CC0000-0x0000000008E82000-memory.dmp

      Filesize

      1.8MB

    • memory/4672-147-0x0000000008E90000-0x00000000093BC000-memory.dmp

      Filesize

      5.2MB

    • memory/4672-148-0x00000000094C0000-0x00000000094DE000-memory.dmp

      Filesize

      120KB

    • memory/4672-150-0x0000000000400000-0x00000000006E0000-memory.dmp

      Filesize

      2.9MB