Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2023, 04:48

General

  • Target

    0d64a188d48d5d88f95170044be725b60409ef326b3a1353615d50830c069f36.exe

  • Size

    395KB

  • MD5

    4696234df61d1103c6b3238edbc0d48b

  • SHA1

    7c696d7c385b369c9fb37d8f09ea1c7c54c6e456

  • SHA256

    0d64a188d48d5d88f95170044be725b60409ef326b3a1353615d50830c069f36

  • SHA512

    37771b41f786b199f510431ee2690aa2f1a47a35665e7a6a5939d010595a1b89dd0747f7c75dd151f836026667fc533ef115b41751749756f840ae7d05e5bc53

  • SSDEEP

    6144:7Rc/0FLMI/ufS8hIESrHLT+kE7SgrVIzIZ7ODOTiM6A:7Rc/0Fz/k3SrHL3EmgrVVZqDONZ

Score
7/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d64a188d48d5d88f95170044be725b60409ef326b3a1353615d50830c069f36.exe
    "C:\Users\Admin\AppData\Local\Temp\0d64a188d48d5d88f95170044be725b60409ef326b3a1353615d50830c069f36.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4080-133-0x0000000003620000-0x000000000365B000-memory.dmp

    Filesize

    236KB

  • memory/4080-134-0x0000000003660000-0x00000000036AF000-memory.dmp

    Filesize

    316KB

  • memory/4080-135-0x0000000000400000-0x00000000018E0000-memory.dmp

    Filesize

    20.9MB

  • memory/4080-136-0x0000000074F40000-0x00000000756F0000-memory.dmp

    Filesize

    7.7MB

  • memory/4080-137-0x00000000061D0000-0x00000000061E0000-memory.dmp

    Filesize

    64KB

  • memory/4080-138-0x00000000061D0000-0x00000000061E0000-memory.dmp

    Filesize

    64KB

  • memory/4080-139-0x00000000061D0000-0x00000000061E0000-memory.dmp

    Filesize

    64KB

  • memory/4080-140-0x00000000061E0000-0x0000000006784000-memory.dmp

    Filesize

    5.6MB

  • memory/4080-141-0x0000000006120000-0x00000000061B2000-memory.dmp

    Filesize

    584KB

  • memory/4080-142-0x00000000061D0000-0x00000000061E0000-memory.dmp

    Filesize

    64KB

  • memory/4080-143-0x0000000008D70000-0x0000000008D7A000-memory.dmp

    Filesize

    40KB

  • memory/4080-144-0x0000000008E00000-0x0000000009418000-memory.dmp

    Filesize

    6.1MB

  • memory/4080-145-0x0000000009450000-0x0000000009462000-memory.dmp

    Filesize

    72KB

  • memory/4080-146-0x0000000009470000-0x000000000957A000-memory.dmp

    Filesize

    1.0MB

  • memory/4080-147-0x0000000009580000-0x00000000095BC000-memory.dmp

    Filesize

    240KB

  • memory/4080-148-0x00000000097A0000-0x0000000009806000-memory.dmp

    Filesize

    408KB

  • memory/4080-149-0x0000000009F50000-0x0000000009FC6000-memory.dmp

    Filesize

    472KB

  • memory/4080-150-0x000000000A020000-0x000000000A1E2000-memory.dmp

    Filesize

    1.8MB

  • memory/4080-151-0x000000000A200000-0x000000000A72C000-memory.dmp

    Filesize

    5.2MB

  • memory/4080-152-0x0000000003620000-0x000000000365B000-memory.dmp

    Filesize

    236KB

  • memory/4080-153-0x000000000A830000-0x000000000A84E000-memory.dmp

    Filesize

    120KB

  • memory/4080-154-0x0000000003660000-0x00000000036AF000-memory.dmp

    Filesize

    316KB

  • memory/4080-155-0x0000000000400000-0x00000000018E0000-memory.dmp

    Filesize

    20.9MB

  • memory/4080-157-0x0000000074F40000-0x00000000756F0000-memory.dmp

    Filesize

    7.7MB

  • memory/4080-158-0x00000000061D0000-0x00000000061E0000-memory.dmp

    Filesize

    64KB

  • memory/4080-160-0x00000000061D0000-0x00000000061E0000-memory.dmp

    Filesize

    64KB

  • memory/4080-161-0x00000000061D0000-0x00000000061E0000-memory.dmp

    Filesize

    64KB