Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2023, 11:50

General

  • Target

    c30ab3c11b97bb75e87a69ce38056e0e38584c7bd92067a62a41d6a4d4ef828e.exe

  • Size

    204KB

  • MD5

    feedd0af3135c277aa75f2ab9a86965d

  • SHA1

    c3a7f0dbe7969cf0348335326b6d3740f8c9ff64

  • SHA256

    c30ab3c11b97bb75e87a69ce38056e0e38584c7bd92067a62a41d6a4d4ef828e

  • SHA512

    3e94cef07a849a4e3eb3fd6d1dca98021ad974cc466e5fcf62cef63db5986f9b9cde25f6870d353bfec3942d771bdbe2024174d2cef87df735265fffcb4fcf9e

  • SSDEEP

    6144:EKUrg0PTbOu4CCE1jqAO3iScrpIcGm+WhEZRmY8:EK8xOvCCijqAyNcjxI58

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c30ab3c11b97bb75e87a69ce38056e0e38584c7bd92067a62a41d6a4d4ef828e.exe
    "C:\Users\Admin\AppData\Local\Temp\c30ab3c11b97bb75e87a69ce38056e0e38584c7bd92067a62a41d6a4d4ef828e.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_uslhlqjy.n4j.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Zander_Tools\c30ab3c11b97bb75e87a69ce3_Url_ds0y5eqkg1akw3g2raos45wmosgcahay\1.6.0.34738\ujf53ixt.newcfg

    Filesize

    1KB

    MD5

    7d46ec4905f70391526a95035538bfbe

    SHA1

    96187ae3c39664bcf756661268d3984720874c62

    SHA256

    2b18b9b8da60c933acd839787c96b27df79516400a785da8f59d61611dfaac0c

    SHA512

    b5a69180baf9ff94f057f6cf5aace60c567de41103b406c676eebf68437fa809236842aeb428c9f5a03488b350e5647f2a0d67aea0ef24a978e287a2fb15927e

  • C:\Users\Admin\AppData\Local\Zander_Tools\c30ab3c11b97bb75e87a69ce3_Url_ds0y5eqkg1akw3g2raos45wmosgcahay\1.6.0.34738\user.config

    Filesize

    827B

    MD5

    a71b2875cb982f979bb5140665c8e712

    SHA1

    3c073001a408355517bd6b3bf7e0dffde034f994

    SHA256

    343789c61269549defc214994be390833db47815a063e35436b104e7e4424a8f

    SHA512

    e69f2e4ad1de075e747f4b510ce1ac30ce1d247673783501ae2005886b4bb2dc02b59dc4a076dd99714cb3ebad4aaa431bf00a59fe2da771282a83b63b6d3ddd

  • C:\Users\Admin\AppData\Local\Zander_Tools\c30ab3c11b97bb75e87a69ce3_Url_ds0y5eqkg1akw3g2raos45wmosgcahay\1.6.0.34738\user.config

    Filesize

    979B

    MD5

    e8f3f527447ff7dc020bdc86154312dc

    SHA1

    64314d1da449d23a94fb5673be5e9d754e2d7e1b

    SHA256

    66a04140444ab02048c352c73e7b50cd3985f2c5a7e0897ef3bb596162ef0785

    SHA512

    4c39019da98edf73b88ec5dc26ed17f47d53500c2305279192c13f38141103b78a1a0b45c71a6ef34b4e253dd2ad6cdcddcba5e164c724a4c77825412be26ce1

  • memory/4868-42-0x00000245E0BE0000-0x00000245E0BE8000-memory.dmp

    Filesize

    32KB

  • memory/4868-48-0x00000245E3220000-0x00000245E322E000-memory.dmp

    Filesize

    56KB

  • memory/4868-6-0x00007FFBC9500000-0x00007FFBC9FC1000-memory.dmp

    Filesize

    10.8MB

  • memory/4868-3-0x00000245C79E0000-0x00000245C79F0000-memory.dmp

    Filesize

    64KB

  • memory/4868-2-0x00007FFBC9500000-0x00007FFBC9FC1000-memory.dmp

    Filesize

    10.8MB

  • memory/4868-41-0x00000245E0C30000-0x00000245E0DF2000-memory.dmp

    Filesize

    1.8MB

  • memory/4868-0-0x00000245C5E10000-0x00000245C5E46000-memory.dmp

    Filesize

    216KB

  • memory/4868-43-0x00000245E3240000-0x00000245E3278000-memory.dmp

    Filesize

    224KB

  • memory/4868-1-0x00000245C7B40000-0x00000245C7B9C000-memory.dmp

    Filesize

    368KB

  • memory/4868-7-0x00000245C79E0000-0x00000245C79F0000-memory.dmp

    Filesize

    64KB

  • memory/4868-54-0x00000245E32B0000-0x00000245E32D2000-memory.dmp

    Filesize

    136KB

  • memory/4868-55-0x00000245C79E0000-0x00000245C79F0000-memory.dmp

    Filesize

    64KB

  • memory/4868-56-0x00000245C79E0000-0x00000245C79F0000-memory.dmp

    Filesize

    64KB

  • memory/4868-57-0x00000245E43B0000-0x00000245E4400000-memory.dmp

    Filesize

    320KB

  • memory/4868-58-0x00000245E5930000-0x00000245E5E58000-memory.dmp

    Filesize

    5.2MB

  • memory/4868-59-0x00000245C79E0000-0x00000245C79F0000-memory.dmp

    Filesize

    64KB

  • memory/4868-60-0x00000245C79E0000-0x00000245C79F0000-memory.dmp

    Filesize

    64KB