Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/08/2023, 19:38

General

  • Target

    Information.lnk

  • Size

    1KB

  • MD5

    8fd497870926cbca338475287214572e

  • SHA1

    2626e891b55d0132eda86841ab648e47dd0d6bae

  • SHA256

    32e1eebf2af8d36857b3a9ea3a2653e8e7ad6b6eab8ca4665b252b5fb609d993

  • SHA512

    43ea429f8e5bf8a623d28034cc1e287534fc347322339e0a633121d88a4188a8f07a53f9f587d72d78bc61a6a297a7de8db6769c2c6b0a6f41d546a0f44fd4cb

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Information.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3872
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /k start agenda.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5012
      • C:\Users\Admin\AppData\Local\Temp\agenda.exe
        agenda.exe
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4916-133-0x00007FFF45770000-0x00007FFF45965000-memory.dmp

    Filesize

    2.0MB

  • memory/4916-134-0x00007FFF37A40000-0x00007FFF37F10000-memory.dmp

    Filesize

    4.8MB

  • memory/4916-139-0x00007FFF27750000-0x00007FFF28211000-memory.dmp

    Filesize

    10.8MB

  • memory/4916-140-0x0000017FF3DB0000-0x0000017FF3DC0000-memory.dmp

    Filesize

    64KB

  • memory/4916-141-0x0000017FF3DB0000-0x0000017FF3DC0000-memory.dmp

    Filesize

    64KB

  • memory/4916-142-0x0000017FF3DB0000-0x0000017FF3DC0000-memory.dmp

    Filesize

    64KB

  • memory/4916-143-0x0000017FF4070000-0x0000017FF4092000-memory.dmp

    Filesize

    136KB

  • memory/4916-144-0x00007FFF27750000-0x00007FFF28211000-memory.dmp

    Filesize

    10.8MB

  • memory/4916-145-0x0000017FF3DB0000-0x0000017FF3DC0000-memory.dmp

    Filesize

    64KB

  • memory/4916-146-0x0000017FF3DB0000-0x0000017FF3DC0000-memory.dmp

    Filesize

    64KB

  • memory/4916-147-0x0000017FF3DB0000-0x0000017FF3DC0000-memory.dmp

    Filesize

    64KB