Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2023, 21:42

General

  • Target

    file.exe

  • Size

    487KB

  • MD5

    69582cd0464ad1e3d68a68822c2eca58

  • SHA1

    e3d6e997826d30ab2eb0d4a55e76175184df7768

  • SHA256

    60232c2f40d59f3c48dfc9c3e5d70941ccdc99b6e735b6aaeba919ff20d0632d

  • SHA512

    56780066bb30fc565c1ddae1a251d10aac53e47219eb62e0ba8bd901c6d48b4458caf26020591fbac2ad6c53354833ab45e601516facd97e6471dca67b9887a2

  • SSDEEP

    6144:NWQoC226KIbH5KNFbWrEJZWcmmHTW+HE1h4AQHWpe:NN922zNFbWwJB3HiPeW

Score
7/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4844-134-0x0000000002420000-0x0000000002520000-memory.dmp

    Filesize

    1024KB

  • memory/4844-135-0x0000000003F40000-0x0000000003F8F000-memory.dmp

    Filesize

    316KB

  • memory/4844-136-0x0000000000400000-0x0000000002320000-memory.dmp

    Filesize

    31.1MB

  • memory/4844-137-0x0000000006B20000-0x0000000006B30000-memory.dmp

    Filesize

    64KB

  • memory/4844-138-0x0000000074F30000-0x00000000756E0000-memory.dmp

    Filesize

    7.7MB

  • memory/4844-139-0x0000000006B20000-0x0000000006B30000-memory.dmp

    Filesize

    64KB

  • memory/4844-140-0x0000000006B90000-0x0000000007134000-memory.dmp

    Filesize

    5.6MB

  • memory/4844-141-0x0000000009660000-0x00000000096F2000-memory.dmp

    Filesize

    584KB

  • memory/4844-142-0x0000000006B20000-0x0000000006B30000-memory.dmp

    Filesize

    64KB

  • memory/4844-143-0x0000000009880000-0x000000000988A000-memory.dmp

    Filesize

    40KB

  • memory/4844-144-0x0000000009890000-0x0000000009EA8000-memory.dmp

    Filesize

    6.1MB

  • memory/4844-145-0x0000000009F50000-0x0000000009F62000-memory.dmp

    Filesize

    72KB

  • memory/4844-146-0x0000000009F70000-0x000000000A07A000-memory.dmp

    Filesize

    1.0MB

  • memory/4844-147-0x000000000A080000-0x000000000A0BC000-memory.dmp

    Filesize

    240KB

  • memory/4844-148-0x0000000002420000-0x0000000002520000-memory.dmp

    Filesize

    1024KB

  • memory/4844-149-0x000000000A2A0000-0x000000000A306000-memory.dmp

    Filesize

    408KB

  • memory/4844-150-0x000000000A940000-0x000000000A9B6000-memory.dmp

    Filesize

    472KB

  • memory/4844-151-0x000000000AA20000-0x000000000ABE2000-memory.dmp

    Filesize

    1.8MB

  • memory/4844-152-0x000000000AC00000-0x000000000B12C000-memory.dmp

    Filesize

    5.2MB

  • memory/4844-153-0x0000000003F40000-0x0000000003F8F000-memory.dmp

    Filesize

    316KB

  • memory/4844-154-0x000000000B230000-0x000000000B24E000-memory.dmp

    Filesize

    120KB

  • memory/4844-155-0x0000000000400000-0x0000000002320000-memory.dmp

    Filesize

    31.1MB

  • memory/4844-157-0x0000000006B20000-0x0000000006B30000-memory.dmp

    Filesize

    64KB

  • memory/4844-158-0x0000000074F30000-0x00000000756E0000-memory.dmp

    Filesize

    7.7MB

  • memory/4844-160-0x0000000006B20000-0x0000000006B30000-memory.dmp

    Filesize

    64KB