Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2024, 13:05

General

  • Target

    5398a651ad739168881721fe2b236024.exe

  • Size

    271KB

  • MD5

    5398a651ad739168881721fe2b236024

  • SHA1

    488759273e26c6962ef7cfb55c0e90df6afe2d29

  • SHA256

    79e89605c7f35eabcfdb5cde52812ecdb7b1b9a0bccd545db15f96fc66521c78

  • SHA512

    0d4bcf0dabce89aceed14a4d64133ca1e5dea6f066bffc07185a27c6d9aae5cc803e148d42fe057bed1227b9b0bef29e1783cca4baf5a45739a146de648709bc

  • SSDEEP

    6144:/FqlaakfXJgJLq+gRk13o+qOeq18owv7toL+9WXY41czfGZFYdyLnywxv:/caDg1q+74+C+S799wY4ObGh

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5398a651ad739168881721fe2b236024.exe
    "C:\Users\Admin\AppData\Local\Temp\5398a651ad739168881721fe2b236024.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1512
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3424

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1512-0-0x0000000000400000-0x00000000007BA000-memory.dmp

      Filesize

      3.7MB

    • memory/1512-2-0x00000000028D0000-0x00000000029C0000-memory.dmp

      Filesize

      960KB

    • memory/1512-1-0x0000000000400000-0x00000000007BA000-memory.dmp

      Filesize

      3.7MB

    • memory/1512-7-0x0000000000400000-0x00000000007BA000-memory.dmp

      Filesize

      3.7MB

    • memory/1512-8-0x00000000028D0000-0x00000000029C0000-memory.dmp

      Filesize

      960KB

    • memory/1512-6-0x0000000000400000-0x00000000007BA000-memory.dmp

      Filesize

      3.7MB