Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/08/2023, 11:49

General

  • Target

    674bacf7a1d3d314e5630a3941d8356207aaa7a81af8f173299bb6009c98747c.exe

  • Size

    12.8MB

  • MD5

    103e2123c21bb9f7a1fb2eaf41cbcf5c

  • SHA1

    086f3cd3189f9e904e4cc19396f7cdfb2c854e3f

  • SHA256

    674bacf7a1d3d314e5630a3941d8356207aaa7a81af8f173299bb6009c98747c

  • SHA512

    92a6fa1902fa0706a171be51c02c2c2a3b17664bae7d10a1e39f0869ae949123073968db7def5483d00760cff6dc2867739398c2a2cae740fb05c9ed128640bf

  • SSDEEP

    196608:W4HKDQBKkXy+X7t815j5tDobSUFQ2KJweJ+9eLrt:WaK0BK+qvj5t0ZFQ2KJwesWR

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\674bacf7a1d3d314e5630a3941d8356207aaa7a81af8f173299bb6009c98747c.exe
    "C:\Users\Admin\AppData\Local\Temp\674bacf7a1d3d314e5630a3941d8356207aaa7a81af8f173299bb6009c98747c.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:4152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4152-133-0x0000000000400000-0x0000000000F93000-memory.dmp

    Filesize

    11.6MB

  • memory/4152-134-0x0000000076110000-0x0000000076325000-memory.dmp

    Filesize

    2.1MB

  • memory/4152-4008-0x00000000766B0000-0x0000000076850000-memory.dmp

    Filesize

    1.6MB

  • memory/4152-6017-0x0000000077200000-0x000000007727A000-memory.dmp

    Filesize

    488KB

  • memory/4152-13203-0x0000000002D60000-0x0000000002D6B000-memory.dmp

    Filesize

    44KB

  • memory/4152-13205-0x0000000002D70000-0x0000000002D7B000-memory.dmp

    Filesize

    44KB

  • memory/4152-13207-0x0000000002D80000-0x0000000002D88000-memory.dmp

    Filesize

    32KB

  • memory/4152-13208-0x0000000002D90000-0x0000000002D97000-memory.dmp

    Filesize

    28KB

  • memory/4152-13209-0x0000000002D50000-0x0000000002D53000-memory.dmp

    Filesize

    12KB

  • memory/4152-13210-0x0000000000400000-0x0000000000F93000-memory.dmp

    Filesize

    11.6MB

  • memory/4152-13212-0x0000000000400000-0x0000000000F93000-memory.dmp

    Filesize

    11.6MB

  • memory/4152-13213-0x0000000002F00000-0x0000000002F01000-memory.dmp

    Filesize

    4KB

  • memory/4152-13214-0x00000000042F0000-0x00000000043A7000-memory.dmp

    Filesize

    732KB

  • memory/4152-13215-0x0000000002D60000-0x0000000002D6B000-memory.dmp

    Filesize

    44KB

  • memory/4152-13216-0x0000000000400000-0x0000000000F93000-memory.dmp

    Filesize

    11.6MB

  • memory/4152-13217-0x0000000002D70000-0x0000000002D7B000-memory.dmp

    Filesize

    44KB

  • memory/4152-13218-0x0000000000400000-0x0000000000F93000-memory.dmp

    Filesize

    11.6MB

  • memory/4152-13219-0x0000000002F00000-0x0000000002F01000-memory.dmp

    Filesize

    4KB

  • memory/4152-13220-0x00000000042F0000-0x00000000043A7000-memory.dmp

    Filesize

    732KB