Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    128s
  • max time network
    135s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05/08/2023, 08:17

General

  • Target

    e0cbef41b94e9d39afbb3fe069cacb7291c27f21ac4d8574a2a54d4240be19a7.exe

  • Size

    461KB

  • MD5

    a6759d189ab80f2b0f3fde7d8a1c3bd1

  • SHA1

    1fdbf3b245cf3fa1b3e7be4956a9dce3c121028c

  • SHA256

    e0cbef41b94e9d39afbb3fe069cacb7291c27f21ac4d8574a2a54d4240be19a7

  • SHA512

    10d94dd49830a0b4bfee33fa4c84630b947d3932a858b4b1d30cdf0ff402a03629f4e5ef483b458c963b84e56ffa811bc78fdb8287a7eb28414bb676d444285b

  • SSDEEP

    6144:hbvrmkpRDUpnb8+nO72ORUpEGIm4KHVlNqWX26wSOAo:hjrJDUpo+nSxRUpSm4Mbq626hO

Score
7/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0cbef41b94e9d39afbb3fe069cacb7291c27f21ac4d8574a2a54d4240be19a7.exe
    "C:\Users\Admin\AppData\Local\Temp\e0cbef41b94e9d39afbb3fe069cacb7291c27f21ac4d8574a2a54d4240be19a7.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3924-122-0x0000000002510000-0x0000000002610000-memory.dmp

    Filesize

    1024KB

  • memory/3924-123-0x0000000002480000-0x00000000024CF000-memory.dmp

    Filesize

    316KB

  • memory/3924-124-0x0000000004190000-0x00000000041F4000-memory.dmp

    Filesize

    400KB

  • memory/3924-126-0x0000000000400000-0x0000000002319000-memory.dmp

    Filesize

    31.1MB

  • memory/3924-125-0x0000000006B00000-0x0000000006FFE000-memory.dmp

    Filesize

    5.0MB

  • memory/3924-127-0x0000000006AF0000-0x0000000006B00000-memory.dmp

    Filesize

    64KB

  • memory/3924-129-0x0000000004470000-0x00000000044D2000-memory.dmp

    Filesize

    392KB

  • memory/3924-130-0x0000000006AF0000-0x0000000006B00000-memory.dmp

    Filesize

    64KB

  • memory/3924-128-0x0000000006AF0000-0x0000000006B00000-memory.dmp

    Filesize

    64KB

  • memory/3924-131-0x0000000009380000-0x0000000009412000-memory.dmp

    Filesize

    584KB

  • memory/3924-132-0x0000000073810000-0x0000000073EFE000-memory.dmp

    Filesize

    6.9MB

  • memory/3924-133-0x0000000006AF0000-0x0000000006B00000-memory.dmp

    Filesize

    64KB

  • memory/3924-134-0x0000000006AE0000-0x0000000006AEA000-memory.dmp

    Filesize

    40KB

  • memory/3924-135-0x0000000009530000-0x0000000009B36000-memory.dmp

    Filesize

    6.0MB

  • memory/3924-136-0x0000000009BA0000-0x0000000009BB2000-memory.dmp

    Filesize

    72KB

  • memory/3924-137-0x0000000009BD0000-0x0000000009CDA000-memory.dmp

    Filesize

    1.0MB

  • memory/3924-138-0x0000000009D00000-0x0000000009D3E000-memory.dmp

    Filesize

    248KB

  • memory/3924-139-0x0000000009EA0000-0x0000000009EEB000-memory.dmp

    Filesize

    300KB

  • memory/3924-140-0x0000000009F80000-0x0000000009FE6000-memory.dmp

    Filesize

    408KB

  • memory/3924-141-0x000000000A8F0000-0x000000000A966000-memory.dmp

    Filesize

    472KB

  • memory/3924-142-0x000000000A9A0000-0x000000000A9BE000-memory.dmp

    Filesize

    120KB

  • memory/3924-143-0x000000000AAC0000-0x000000000AC82000-memory.dmp

    Filesize

    1.8MB

  • memory/3924-144-0x0000000002510000-0x0000000002610000-memory.dmp

    Filesize

    1024KB

  • memory/3924-145-0x000000000AC90000-0x000000000B1BC000-memory.dmp

    Filesize

    5.2MB

  • memory/3924-146-0x0000000002480000-0x00000000024CF000-memory.dmp

    Filesize

    316KB

  • memory/3924-148-0x0000000000400000-0x0000000002319000-memory.dmp

    Filesize

    31.1MB

  • memory/3924-149-0x0000000000400000-0x0000000002319000-memory.dmp

    Filesize

    31.1MB

  • memory/3924-151-0x0000000073810000-0x0000000073EFE000-memory.dmp

    Filesize

    6.9MB