Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    131s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/06/2023, 17:37

General

  • Target

    file.exe

  • Size

    452KB

  • MD5

    45a233b6774a3b0c870d171353a6a2e2

  • SHA1

    74e6976aa1b684491819ec031fb175659ae75405

  • SHA256

    0a8f958b2672c2ba729f9fa15c299f31ce31a071796f0a60810db531cdf7876b

  • SHA512

    d454b7140d3504359d290ce1b03067cfe9c60881863b226da1ae5cfccc819968c4fc03cbaeea45a4fd6c3f5c7b561edbf4c9baf358c0aa420b09d6e8aa7693f2

  • SSDEEP

    6144:DCAmhxnLENyu63vFTp6biMHW9WfVW997ghcBz7:mxnwIV31p6bH7fEbgOz

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4532
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4532 -s 1284
      2⤵
      • Program crash
      PID:4728
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4532 -ip 4532
    1⤵
      PID:2012

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4532-133-0x0000000005230000-0x0000000005259000-memory.dmp

      Filesize

      164KB

    • memory/4532-134-0x0000000005260000-0x000000000529F000-memory.dmp

      Filesize

      252KB

    • memory/4532-135-0x0000000007C80000-0x0000000008224000-memory.dmp

      Filesize

      5.6MB

    • memory/4532-136-0x0000000007C70000-0x0000000007C80000-memory.dmp

      Filesize

      64KB

    • memory/4532-137-0x0000000007C70000-0x0000000007C80000-memory.dmp

      Filesize

      64KB

    • memory/4532-138-0x00000000083A0000-0x00000000089B8000-memory.dmp

      Filesize

      6.1MB

    • memory/4532-139-0x00000000089C0000-0x0000000008ACA000-memory.dmp

      Filesize

      1.0MB

    • memory/4532-140-0x0000000008B00000-0x0000000008B12000-memory.dmp

      Filesize

      72KB

    • memory/4532-141-0x0000000007C70000-0x0000000007C80000-memory.dmp

      Filesize

      64KB

    • memory/4532-142-0x0000000008B20000-0x0000000008B5C000-memory.dmp

      Filesize

      240KB

    • memory/4532-143-0x0000000008D20000-0x0000000008D96000-memory.dmp

      Filesize

      472KB

    • memory/4532-144-0x0000000008DA0000-0x0000000008E32000-memory.dmp

      Filesize

      584KB

    • memory/4532-145-0x0000000008E40000-0x0000000008EA6000-memory.dmp

      Filesize

      408KB

    • memory/4532-146-0x0000000000400000-0x00000000034E0000-memory.dmp

      Filesize

      48.9MB

    • memory/4532-147-0x0000000007C70000-0x0000000007C80000-memory.dmp

      Filesize

      64KB

    • memory/4532-148-0x0000000007C70000-0x0000000007C80000-memory.dmp

      Filesize

      64KB

    • memory/4532-149-0x0000000009820000-0x0000000009870000-memory.dmp

      Filesize

      320KB

    • memory/4532-150-0x000000000B820000-0x000000000B9E2000-memory.dmp

      Filesize

      1.8MB

    • memory/4532-151-0x000000000B9F0000-0x000000000BF1C000-memory.dmp

      Filesize

      5.2MB

    • memory/4532-153-0x0000000000400000-0x00000000034E0000-memory.dmp

      Filesize

      48.9MB