Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    17/09/2023, 18:39

General

  • Target

    eea8b7e5470d11a430902b53c2455233_JC.exe

  • Size

    124KB

  • MD5

    eea8b7e5470d11a430902b53c2455233

  • SHA1

    811f45b430deee05b8861478c5153327f45048f2

  • SHA256

    d621f8c50bacc88c62443e17b28264ef40afceb2fc4f82d284ca32643f52a965

  • SHA512

    3fe7d7edff438a4fdbd9b0c360cc4defb2f6e955bbdf04c896ee0c6e02e66c2d91d15fe199ae79537341c2ce2a6729a1709639edd014bc1021688870cd50d688

  • SSDEEP

    3072:qq8f/oic1i9uTAlPQSDwEyWefHEvGdxETCpPJZ:h8f/U1iF/sUGdxETI

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eea8b7e5470d11a430902b53c2455233_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\eea8b7e5470d11a430902b53c2455233_JC.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Roaming\mkn47A4.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\eea8b7e5470d11a430902b53c2455233_JC.exe""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3044
      • C:\Windows\SysWOW64\attrib.exe
        attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\eea8b7e5470d11a430902b53c2455233_JC.exe"
        3⤵
        • Views/modifies file attributes
        PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\mkn47A4.tmp.bat

    Filesize

    53B

    MD5

    cd14315ab212f7a1cd99b1e77187acf4

    SHA1

    c8c807380f64fe0355d2cafc800e2460bba41297

    SHA256

    7d06a327ab132b2a12b7cd992c70beb8006373116134a2a0b010465f9f742556

    SHA512

    3d670da05d344b35847e3a2adfcb64f95a0dfe9ff0d802b917903b107d179fcdaa09f3855100f85ef56d4acdac36bd39f5e87d86c095e8cd67f063e3408aa883

  • C:\Users\Admin\AppData\Roaming\mkn47A4.tmp.bat

    Filesize

    53B

    MD5

    cd14315ab212f7a1cd99b1e77187acf4

    SHA1

    c8c807380f64fe0355d2cafc800e2460bba41297

    SHA256

    7d06a327ab132b2a12b7cd992c70beb8006373116134a2a0b010465f9f742556

    SHA512

    3d670da05d344b35847e3a2adfcb64f95a0dfe9ff0d802b917903b107d179fcdaa09f3855100f85ef56d4acdac36bd39f5e87d86c095e8cd67f063e3408aa883

  • memory/2112-0-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/2112-16-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB