Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/11/2023, 19:14

General

  • Target

    745d8009eeece0ff9d561ad958209c2fcbe674348d6757a81f35462273fb8f12.exe

  • Size

    27KB

  • MD5

    9a5b5730214255f4637989c42781988e

  • SHA1

    e7922305934de75ba2521edb27ad462e450bb4bc

  • SHA256

    745d8009eeece0ff9d561ad958209c2fcbe674348d6757a81f35462273fb8f12

  • SHA512

    6e33cd2edbfefe9335a5f9ffe413b9a7d57c9b1febc58efaf353205dd4fe463e812dccc9da6101e0c7d7b2fa452393b67cca974a93ea00b186c69c6cdaefe314

  • SSDEEP

    192:BvBJqAPhpeS1ZK8O3CDHIbzMZlbv110GPdYPmVI+UGj8C+RPj3dkUV0lfgZxKn2:nUAPopMZlB5P6d+UkSDqPlIZQ2

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\745d8009eeece0ff9d561ad958209c2fcbe674348d6757a81f35462273fb8f12.exe
    "C:\Users\Admin\AppData\Local\Temp\745d8009eeece0ff9d561ad958209c2fcbe674348d6757a81f35462273fb8f12.exe"
    1⤵
      PID:3636
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:1284
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:876

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

        Filesize

        16KB

        MD5

        e0331e68c4595914cac1322d909eaa69

        SHA1

        f30da31856525fc8375d63c33fe88bd49b964f87

        SHA256

        6ec3e2cf395995a417bcde51bbca9b61653f053699396ff4be2e2b878cc65f50

        SHA512

        814c99df834d4891a05df86a8cbe6c79b745d0c908f8434e858aa48d88977ccc18df1297a2ca4e02bd3bc26fe310d991558eae9f7a126e670b71a6bc171f251e

      • memory/876-42-0x000001B61DFE0000-0x000001B61DFE1000-memory.dmp

        Filesize

        4KB

      • memory/876-43-0x000001B61DFE0000-0x000001B61DFE1000-memory.dmp

        Filesize

        4KB

      • memory/876-18-0x000001B615B40000-0x000001B615B50000-memory.dmp

        Filesize

        64KB

      • memory/876-34-0x000001B61DFC0000-0x000001B61DFC1000-memory.dmp

        Filesize

        4KB

      • memory/876-35-0x000001B61DFE0000-0x000001B61DFE1000-memory.dmp

        Filesize

        4KB

      • memory/876-36-0x000001B61DFE0000-0x000001B61DFE1000-memory.dmp

        Filesize

        4KB

      • memory/876-70-0x000001B61DF60000-0x000001B61DF61000-memory.dmp

        Filesize

        4KB

      • memory/876-38-0x000001B61DFE0000-0x000001B61DFE1000-memory.dmp

        Filesize

        4KB

      • memory/876-39-0x000001B61DFE0000-0x000001B61DFE1000-memory.dmp

        Filesize

        4KB

      • memory/876-40-0x000001B61DFE0000-0x000001B61DFE1000-memory.dmp

        Filesize

        4KB

      • memory/876-2-0x000001B615A40000-0x000001B615A50000-memory.dmp

        Filesize

        64KB

      • memory/876-37-0x000001B61DFE0000-0x000001B61DFE1000-memory.dmp

        Filesize

        4KB

      • memory/876-48-0x000001B61DD10000-0x000001B61DD11000-memory.dmp

        Filesize

        4KB

      • memory/876-44-0x000001B61DFE0000-0x000001B61DFE1000-memory.dmp

        Filesize

        4KB

      • memory/876-45-0x000001B61DD10000-0x000001B61DD11000-memory.dmp

        Filesize

        4KB

      • memory/876-46-0x000001B61DD00000-0x000001B61DD01000-memory.dmp

        Filesize

        4KB

      • memory/876-41-0x000001B61DFE0000-0x000001B61DFE1000-memory.dmp

        Filesize

        4KB

      • memory/876-51-0x000001B61DD00000-0x000001B61DD01000-memory.dmp

        Filesize

        4KB

      • memory/876-54-0x000001B61DC40000-0x000001B61DC41000-memory.dmp

        Filesize

        4KB

      • memory/876-69-0x000001B61DE50000-0x000001B61DE51000-memory.dmp

        Filesize

        4KB

      • memory/876-66-0x000001B61DE40000-0x000001B61DE41000-memory.dmp

        Filesize

        4KB

      • memory/876-68-0x000001B61DE50000-0x000001B61DE51000-memory.dmp

        Filesize

        4KB

      • memory/3636-1-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/3636-0-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB