Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2023, 11:51

General

  • Target

    d9509404580ce24e56a59b1f7107ed42e6cfe2b851a0fad12e2a37392b1df6f3.exe

  • Size

    799KB

  • MD5

    53923635e4cb97bb25fba734b6300e8c

  • SHA1

    709f313a975c773a8f3efbd86b6f08de5c8603a1

  • SHA256

    d9509404580ce24e56a59b1f7107ed42e6cfe2b851a0fad12e2a37392b1df6f3

  • SHA512

    8e0ec902eb0a12303ae464a1ce8e44638b34abcddb4beb0e97c284640366e491515011eb9b4e971256d47620704ce3c700808b69285249750555ccc60aa6ebe2

  • SSDEEP

    24576:ZiOUTgkJ0vB0pGBR7m45NutioZYUiSKJNbdh:ZfUTrpERBuooZYUYJNBh

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9509404580ce24e56a59b1f7107ed42e6cfe2b851a0fad12e2a37392b1df6f3.exe
    "C:\Users\Admin\AppData\Local\Temp\d9509404580ce24e56a59b1f7107ed42e6cfe2b851a0fad12e2a37392b1df6f3.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1968
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:632
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1572

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

      Filesize

      16KB

      MD5

      4d185ff8f8ae593a3535bae5237fd3d9

      SHA1

      3705385c67fde69bc53c64080751350db612341c

      SHA256

      2274269e5835a8ad8f9bdbac945e09d1add8eb765cdf08f7ab4624b7c527bf8e

      SHA512

      f90dd3a51cca4b7e7a4ba5bc089defe3075c26f7f3f71827d8be58e16b06c15c022b77523f886440fe348e6f70d2f54adcd013ea4ec1ba9b223ba9d8d17ab30b

    • memory/1572-42-0x000001ABCAB20000-0x000001ABCAB21000-memory.dmp

      Filesize

      4KB

    • memory/1572-43-0x000001ABCAB20000-0x000001ABCAB21000-memory.dmp

      Filesize

      4KB

    • memory/1572-18-0x000001ABC2540000-0x000001ABC2550000-memory.dmp

      Filesize

      64KB

    • memory/1572-34-0x000001ABCAAF0000-0x000001ABCAAF1000-memory.dmp

      Filesize

      4KB

    • memory/1572-35-0x000001ABCAB20000-0x000001ABCAB21000-memory.dmp

      Filesize

      4KB

    • memory/1572-36-0x000001ABCAB20000-0x000001ABCAB21000-memory.dmp

      Filesize

      4KB

    • memory/1572-70-0x000001ABCA990000-0x000001ABCA991000-memory.dmp

      Filesize

      4KB

    • memory/1572-38-0x000001ABCAB20000-0x000001ABCAB21000-memory.dmp

      Filesize

      4KB

    • memory/1572-39-0x000001ABCAB20000-0x000001ABCAB21000-memory.dmp

      Filesize

      4KB

    • memory/1572-40-0x000001ABCAB20000-0x000001ABCAB21000-memory.dmp

      Filesize

      4KB

    • memory/1572-2-0x000001ABC2440000-0x000001ABC2450000-memory.dmp

      Filesize

      64KB

    • memory/1572-37-0x000001ABCAB20000-0x000001ABCAB21000-memory.dmp

      Filesize

      4KB

    • memory/1572-48-0x000001ABCA740000-0x000001ABCA741000-memory.dmp

      Filesize

      4KB

    • memory/1572-44-0x000001ABCAB20000-0x000001ABCAB21000-memory.dmp

      Filesize

      4KB

    • memory/1572-45-0x000001ABCA740000-0x000001ABCA741000-memory.dmp

      Filesize

      4KB

    • memory/1572-46-0x000001ABCA730000-0x000001ABCA731000-memory.dmp

      Filesize

      4KB

    • memory/1572-41-0x000001ABCAB20000-0x000001ABCAB21000-memory.dmp

      Filesize

      4KB

    • memory/1572-51-0x000001ABCA730000-0x000001ABCA731000-memory.dmp

      Filesize

      4KB

    • memory/1572-54-0x000001ABCA670000-0x000001ABCA671000-memory.dmp

      Filesize

      4KB

    • memory/1572-69-0x000001ABCA880000-0x000001ABCA881000-memory.dmp

      Filesize

      4KB

    • memory/1572-66-0x000001ABCA870000-0x000001ABCA871000-memory.dmp

      Filesize

      4KB

    • memory/1572-68-0x000001ABCA880000-0x000001ABCA881000-memory.dmp

      Filesize

      4KB

    • memory/1968-1-0x0000000000400000-0x0000000000491000-memory.dmp

      Filesize

      580KB

    • memory/1968-0-0x0000000000400000-0x0000000000491000-memory.dmp

      Filesize

      580KB