Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    132s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    23/10/2023, 07:20

General

  • Target

    81cd6e1c6e1f9400e31b122dfa2c7acf274192ec560a9d29190a70abd04b20e2.exe

  • Size

    837KB

  • MD5

    b458e336911f092177a64d07b0bf1c76

  • SHA1

    53c66117a6f17e2d76b7a8a658f1ff0773516081

  • SHA256

    81cd6e1c6e1f9400e31b122dfa2c7acf274192ec560a9d29190a70abd04b20e2

  • SHA512

    2b19cd8e173543449711bbb5f829096688ef688240a68a2021b622ccbdbad53559e171d38b161f71c9585ed58e0871b6fc7d98dc52bd4e36f3435fd11e8621c4

  • SSDEEP

    24576:8II1yp0tk0TdMil1iD5Fk8C1LGF6KXcA9:VS1k0JleFk82CF5d

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81cd6e1c6e1f9400e31b122dfa2c7acf274192ec560a9d29190a70abd04b20e2.exe
    "C:\Users\Admin\AppData\Local\Temp\81cd6e1c6e1f9400e31b122dfa2c7acf274192ec560a9d29190a70abd04b20e2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Windows\system32\cmd.exe
      cmd.exe /c whoami 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2108
      • C:\Windows\system32\whoami.exe
        whoami
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2648
    • C:\Windows\system32\cmd.exe
      cmd.exe /c whoami /upn 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Windows\system32\whoami.exe
        whoami /upn
        3⤵
          PID:1748
      • C:\Windows\system32\cmd.exe
        cmd.exe /c whoami /fqdn 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2748
        • C:\Windows\system32\whoami.exe
          whoami /fqdn
          3⤵
            PID:2412
        • C:\Windows\system32\cmd.exe
          cmd.exe /c whoami /logonid 2>&1
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Windows\system32\whoami.exe
            whoami /logonid
            3⤵
              PID:2768
          • C:\Windows\system32\cmd.exe
            cmd.exe /c whoami /user 2>&1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2788
            • C:\Windows\system32\whoami.exe
              whoami /user
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2716
          • C:\Windows\system32\cmd.exe
            cmd.exe /c whoami /groups 2>&1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2784
            • C:\Windows\system32\whoami.exe
              whoami /groups
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2812
          • C:\Windows\system32\cmd.exe
            cmd.exe /c whoami /claims 2>&1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2696
            • C:\Windows\system32\whoami.exe
              whoami /claims
              3⤵
                PID:2928
            • C:\Windows\system32\cmd.exe
              cmd.exe /c whoami /priv 2>&1
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2680
              • C:\Windows\system32\whoami.exe
                whoami /priv
                3⤵
                  PID:2652
              • C:\Windows\system32\cmd.exe
                cmd.exe /c whoami /all 2>&1
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2588
                • C:\Windows\system32\whoami.exe
                  whoami /all
                  3⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2232

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads