Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    103s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2023, 03:15

General

  • Target

    ڂ̃ANV/ڂ̃ANV.exe

  • Size

    1.6MB

  • MD5

    12d20e7f22c8735e4ea9ed13c27fb657

  • SHA1

    89a4fc8e4a80af74cbdeceaacb2d69122caa037d

  • SHA256

    044f971c251965e950e147b2c508ca54bb74ad4da0f6402bd9471054448d2f7e

  • SHA512

    ed50a6cb8491197f75e59df8da397174d6f0da91fc15283a1e177c61930d00eee05108ab7a437ee82b3d267df11322cc421b630a5082ad2e3927b536cf6374a8

  • SSDEEP

    24576:t0LvWQb1FWy33djbjR9FC0brpYGQwflh6h9a9rw2RNkWgWeiT0W:WLvWQXWm39jRC/9atW+1T0W

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ڂ̃ANV\ڂ̃ANV.exe
    "C:\Users\Admin\AppData\Local\Temp\ڂ̃ANV\ڂ̃ANV.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2844
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x454 0x458
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2404

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ڂ̃ANV\Log.txt

    Filesize

    263B

    MD5

    6c77faa6428b5184a7006029c14eaaf7

    SHA1

    beceef9991412a5f641e25daaa1d5896c17bf4bf

    SHA256

    480edc3cccc52354eb7212ad02526fc54910120a4ad6f326813584fac98662a9

    SHA512

    2d6a43502fddc6a397d28bdafc464f93646cba55f02d0c4a1ac9a6eba7ce3318f6039091fca84bc67b93a4cbcbd6578daba174d9718849b4a06f21ed1038ac81

  • C:\Users\Admin\AppData\Local\Temp\ڂ̃ANV\Log.txt

    Filesize

    548B

    MD5

    f0d47fd98ede1fb525308d6363466a90

    SHA1

    a5facbbbd88d3c247dddc7a0de352419f05333e6

    SHA256

    894bbaf6e96ce3b51010ff035979749b737c13a033cab7856233ab28fc7775c4

    SHA512

    c1b94b76cec805e5366a53171f86f5c59485d1b6355a39cf31ef12bc9206d5f75f49b380f635cca03d6fa64512b15a1c04f8c8a183616978fbcf4dbf8cf14ceb

  • C:\Users\Admin\AppData\Local\Temp\ڂ̃ANV\Log.txt

    Filesize

    1KB

    MD5

    33df329b1f8202d888c3396f4fe6565f

    SHA1

    62f0db86d17811701a8ba6ba65c13c7cdd1f6c26

    SHA256

    7bf28034745fb447ef9ea3408b79ef0a4518828f61b0417a1c07c1b8fcd1e5d9

    SHA512

    335009027807870d7fe7dedf1caddbe2040b7a9a8e54fbfb1162f3e383b1db165ef70571ca447d0e2c867026a2a59fff77547c51e0273bdcff3230920579ef6e

  • C:\Users\Admin\AppData\Local\Temp\ڂ̃ANV\Log.txt

    Filesize

    1KB

    MD5

    52e8e36e39ccf6fa06cc6c702483e488

    SHA1

    23a1fc73f7e9505940f9831e4f1eaeb10ee4e031

    SHA256

    5345d356dcb95161ec4309e3edfc4eecfb84cce2b5b6109a751657b4a5f2944e

    SHA512

    d3ea3aa1edfedf557e601cc8edeb82ff667dbb4f30bfa11810bf5c40c25ee86fd3c57bc7fcb1e62d3a9d7e1e54febe1838649972a4a3ab80f5726bff1ad11746

  • C:\Users\Admin\AppData\Local\Temp\ڂ̃ANV\Log.txt

    Filesize

    2KB

    MD5

    c569f90352089d44d7739ce1c382c56d

    SHA1

    059027015d6fedac611a0ae3cd989f9a64e07709

    SHA256

    f1f1f2e3c970720f0940a49009b77003fea41d53396de0dd5cecde7d721f36e3

    SHA512

    34c9de12d665a1aed9baebddfd23942d6cc40d258e3fedeb598b746d016eeb0131a248a85f2c2f8a185a2498b039d3af6b70541313db0ee957ba094d5a58ffa0

  • C:\Users\Admin\AppData\Local\Temp\ڂ̃ANV\Log.txt

    Filesize

    3KB

    MD5

    f99fcd255f5fb53c93f491daac224b04

    SHA1

    2b520ed2a27e261e43b5552112fba1420dbe9a21

    SHA256

    2ce6c0cf1bad92f7923e68e12012c78b22bd24790a9d06e17c46d031db2a22a0

    SHA512

    29172b578d8f5b8e88f2af3c28ec05a6fd1fc0c6a0ef715ca1a14a68c1474ae33da7666b1f10a376968f3bd607cd63a1a0565319ad946f48c8acae6801f1e637

  • C:\Users\Admin\AppData\Local\Temp\ڂ̃ANV\Log.txt

    Filesize

    3KB

    MD5

    f99fcd255f5fb53c93f491daac224b04

    SHA1

    2b520ed2a27e261e43b5552112fba1420dbe9a21

    SHA256

    2ce6c0cf1bad92f7923e68e12012c78b22bd24790a9d06e17c46d031db2a22a0

    SHA512

    29172b578d8f5b8e88f2af3c28ec05a6fd1fc0c6a0ef715ca1a14a68c1474ae33da7666b1f10a376968f3bd607cd63a1a0565319ad946f48c8acae6801f1e637

  • C:\Users\Admin\AppData\Local\Temp\ڂ̃ANV\Log.txt

    Filesize

    3KB

    MD5

    f99fcd255f5fb53c93f491daac224b04

    SHA1

    2b520ed2a27e261e43b5552112fba1420dbe9a21

    SHA256

    2ce6c0cf1bad92f7923e68e12012c78b22bd24790a9d06e17c46d031db2a22a0

    SHA512

    29172b578d8f5b8e88f2af3c28ec05a6fd1fc0c6a0ef715ca1a14a68c1474ae33da7666b1f10a376968f3bd607cd63a1a0565319ad946f48c8acae6801f1e637

  • C:\Users\Admin\AppData\Local\Temp\ڂ̃ANV\Log.txt

    Filesize

    4KB

    MD5

    d2a200f7c02b8b43c87347a5c2910d8c

    SHA1

    1aafa64580916b909c95b42f54a5c97ce893beae

    SHA256

    8dae2e97e2b6af8b541d9e8227c5eff0db6643133b91927f430e718a7d1fe9ef

    SHA512

    e47530af757e793c5065921e84cd23b032804d8f96dd4147bccdc60aacc85a0c05767ae433029facd584621d9b1384d12f8e3c08e00890d50eb6758df8114e29