Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 16:38

General

  • Target

    06265e97aac3790b69e1d955019b904a.exe

  • Size

    146KB

  • MD5

    06265e97aac3790b69e1d955019b904a

  • SHA1

    6303504ea67878efba3a5fbefe5462abcedb862c

  • SHA256

    25d5313f483954f2b8c3255eaa63e8c5972a6064aa6d06ca49e19b0133d2bdc7

  • SHA512

    bf8041b38082b98b7e3193e4bd369837abc536c61d8e32037c7eb6659eb2aee35ea2a8ed912e5cdf0986533a12a57f477970730b7b83eed90d7bc7fa70139724

  • SSDEEP

    3072:XTutRluFz+AH3QKOjO2TQ7EJBz5OwnRoaXx7OuHZIuH1q7pSPNSycm:0RluFz+AXQ7jOcQ7yDLiQx7OuHZRqM

Score
7/10

Malware Config

Signatures

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06265e97aac3790b69e1d955019b904a.exe
    "C:\Users\Admin\AppData\Local\Temp\06265e97aac3790b69e1d955019b904a.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2740

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads