Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 08:24

General

  • Target

    11d3f9977f989f286648cdd67e90d50a.exe

  • Size

    26KB

  • MD5

    11d3f9977f989f286648cdd67e90d50a

  • SHA1

    21dfebcd805fb17370035b060dc6605feb937985

  • SHA256

    e18ca64e3e626b7eb8e69cd5b8983a4931efcb7d038c5e8531a3adc7544f6017

  • SHA512

    440b08ce487586b190df48e076d4895019e718639b288b55363ec9181599aef59d1bb28e790a8f9c2f0f823c738d7fe27c5645c1ff3ddfd73536d47c87333d23

  • SSDEEP

    768:pEHkglJ2xA6DJsGM41v18bpCWguLgm3HtA:pEHkglmJ9gMWgKX3O

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11d3f9977f989f286648cdd67e90d50a.exe
    "C:\Users\Admin\AppData\Local\Temp\11d3f9977f989f286648cdd67e90d50a.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4368
    • C:\Windows\system32\regsvr32.exe
      "C:\Windows\system32\regsvr32.exe" /s C:\Windows\IDAutomationDMATRIX.DLL
      2⤵
        PID:4256
      • C:\Windows\system32\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s C:\Windows\IDAutomationPDF417.dll
        2⤵
          PID:4956

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3uaz3cqo.4hm.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/4368-0-0x00000000005B0000-0x00000000005BC000-memory.dmp

        Filesize

        48KB

      • memory/4368-10-0x00007FFC9EF50000-0x00007FFC9FA11000-memory.dmp

        Filesize

        10.8MB

      • memory/4368-11-0x00000000026B0000-0x00000000026C0000-memory.dmp

        Filesize

        64KB

      • memory/4368-12-0x0000000002720000-0x0000000002742000-memory.dmp

        Filesize

        136KB

      • memory/4368-13-0x00000000026B0000-0x00000000026C0000-memory.dmp

        Filesize

        64KB

      • memory/4368-15-0x00007FFC9EF50000-0x00007FFC9FA11000-memory.dmp

        Filesize

        10.8MB