Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/10/2023, 14:48

General

  • Target

    0030bec7431fdc43d79d4e6cc0f76bc3eb4fe6f2132c600411540d3c186b8f60.exe

  • Size

    6.2MB

  • MD5

    47b430a57251ea6d140421f938877447

  • SHA1

    527f8cbdda274557cd8274dcc1cb8dd3213dc53c

  • SHA256

    0030bec7431fdc43d79d4e6cc0f76bc3eb4fe6f2132c600411540d3c186b8f60

  • SHA512

    4cd13699b6cc717ff68db70ebdddbc505bdce34d2fe0cb41d7bf0f27ce2a6052562b5af7098fdaa30613cad13c524dec5033c347bc1f01879930fa121f03107b

  • SSDEEP

    98304:gdL7KHjuV8v+M4O2rYu459k2FX7QudlS35zbBy0KmQw:gpR8vJbk2FUud0351Qw

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0030bec7431fdc43d79d4e6cc0f76bc3eb4fe6f2132c600411540d3c186b8f60.exe
    "C:\Users\Admin\AppData\Local\Temp\0030bec7431fdc43d79d4e6cc0f76bc3eb4fe6f2132c600411540d3c186b8f60.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3884-0-0x00000000032E0000-0x000000000330B000-memory.dmp

    Filesize

    172KB

  • memory/3884-2-0x0000000000400000-0x0000000000A90000-memory.dmp

    Filesize

    6.6MB

  • memory/3884-3-0x0000000000400000-0x0000000000A90000-memory.dmp

    Filesize

    6.6MB

  • memory/3884-4-0x0000000077C35000-0x0000000077C36000-memory.dmp

    Filesize

    4KB

  • memory/3884-5-0x00000000763B0000-0x00000000764A0000-memory.dmp

    Filesize

    960KB

  • memory/3884-6-0x0000000077C32000-0x0000000077C33000-memory.dmp

    Filesize

    4KB

  • memory/3884-7-0x0000000077C33000-0x0000000077C34000-memory.dmp

    Filesize

    4KB

  • memory/3884-9-0x0000000077C4B000-0x0000000077C4C000-memory.dmp

    Filesize

    4KB

  • memory/3884-8-0x00000000032E0000-0x000000000330B000-memory.dmp

    Filesize

    172KB

  • memory/3884-10-0x00000000763B0000-0x00000000764A0000-memory.dmp

    Filesize

    960KB

  • memory/3884-11-0x0000000000400000-0x0000000000A90000-memory.dmp

    Filesize

    6.6MB

  • memory/3884-12-0x0000000000400000-0x0000000000A90000-memory.dmp

    Filesize

    6.6MB

  • memory/3884-13-0x0000000077C17000-0x0000000077C18000-memory.dmp

    Filesize

    4KB

  • memory/3884-14-0x0000000000400000-0x0000000000A90000-memory.dmp

    Filesize

    6.6MB

  • memory/3884-15-0x0000000000400000-0x0000000000A90000-memory.dmp

    Filesize

    6.6MB

  • memory/3884-16-0x00000000763B0000-0x00000000764A0000-memory.dmp

    Filesize

    960KB

  • memory/3884-17-0x00000000032E0000-0x000000000330B000-memory.dmp

    Filesize

    172KB

  • memory/3884-18-0x00000000763B0000-0x00000000764A0000-memory.dmp

    Filesize

    960KB