Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    76s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/08/2023, 07:22

General

  • Target

    autoit3.exe

  • Size

    872KB

  • MD5

    c56b5f0201a3b3de53e561fe76912bfd

  • SHA1

    2a4062e10a5de813f5688221dbeb3f3ff33eb417

  • SHA256

    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

  • SHA512

    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

  • SSDEEP

    12288:6pVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31twoPTdFxgawV2M01:6T3E53Myyzl0hMf1tr7Caw8M01

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 38 IoCs
  • Suspicious use of SendNotifyMessage 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\autoit3.exe
    C:\Users\Admin\AppData\Local\Temp\autoit3.exe autoit3.exe rsa2.au3
    1⤵
      PID:2864
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3336

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3336-133-0x0000023B5C410000-0x0000023B5C411000-memory.dmp

      Filesize

      4KB

    • memory/3336-135-0x0000023B5C410000-0x0000023B5C411000-memory.dmp

      Filesize

      4KB

    • memory/3336-134-0x0000023B5C410000-0x0000023B5C411000-memory.dmp

      Filesize

      4KB

    • memory/3336-139-0x0000023B5C410000-0x0000023B5C411000-memory.dmp

      Filesize

      4KB

    • memory/3336-141-0x0000023B5C410000-0x0000023B5C411000-memory.dmp

      Filesize

      4KB

    • memory/3336-140-0x0000023B5C410000-0x0000023B5C411000-memory.dmp

      Filesize

      4KB

    • memory/3336-142-0x0000023B5C410000-0x0000023B5C411000-memory.dmp

      Filesize

      4KB

    • memory/3336-143-0x0000023B5C410000-0x0000023B5C411000-memory.dmp

      Filesize

      4KB

    • memory/3336-144-0x0000023B5C410000-0x0000023B5C411000-memory.dmp

      Filesize

      4KB

    • memory/3336-145-0x0000023B5C410000-0x0000023B5C411000-memory.dmp

      Filesize

      4KB