Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2024, 02:42

General

  • Target

    d86645adc1cdc9e4ad55f0bb801525e5f08a4c52efbf8043ad4fffcfaa311cef/Dism.exe

  • Size

    282KB

  • MD5

    472646bd684bcaac510be7f65f9a08ab

  • SHA1

    6affd43146aa832ef56bdb1fc46294361b554bb1

  • SHA256

    6a2bc5111b7ea9c4c6fdca0db462187b8b9b1ef009bd2d28a2a0124e3d31b95d

  • SHA512

    9aea80eca65e3e7537ed9f5fa6f65cfbf05b4eac98ac9e4eff6c166a62b1560918c0b8861e625697d49a43529e6f77a99c08aff5dfae2568d8042794a2d4e28d

  • SSDEEP

    3072:b5VvsVPUSHmEk6vQWW8mw7T33RtvgdURr7RW1i4MPhEej1D8TboZwC2IMktE/AVF:z0VPUgjnRtnNlW4+WD8TbVC2SrJ

Score
10/10

Malware Config

Signatures

  • Detected phishing page
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d86645adc1cdc9e4ad55f0bb801525e5f08a4c52efbf8043ad4fffcfaa311cef\Dism.exe
    "C:\Users\Admin\AppData\Local\Temp\d86645adc1cdc9e4ad55f0bb801525e5f08a4c52efbf8043ad4fffcfaa311cef\Dism.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2036

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2036-0-0x000001B64AAD0000-0x000001B64AC11000-memory.dmp

    Filesize

    1.3MB

  • memory/2036-1-0x000001B663830000-0x000001B663970000-memory.dmp

    Filesize

    1.2MB

  • memory/2036-2-0x000001B663690000-0x000001B6636D0000-memory.dmp

    Filesize

    256KB

  • memory/2036-6-0x000001B6636E0000-0x000001B6636EC000-memory.dmp

    Filesize

    48KB

  • memory/2036-5-0x000001B64AF20000-0x000001B64AF2C000-memory.dmp

    Filesize

    48KB

  • memory/2036-7-0x000001B663700000-0x000001B663708000-memory.dmp

    Filesize

    32KB

  • memory/2036-4-0x000001B64AF40000-0x000001B64AF48000-memory.dmp

    Filesize

    32KB

  • memory/2036-3-0x000001B64AF30000-0x000001B64AF38000-memory.dmp

    Filesize

    32KB

  • memory/2036-8-0x000001B6636F0000-0x000001B6636FC000-memory.dmp

    Filesize

    48KB

  • memory/2036-9-0x000001B663770000-0x000001B663778000-memory.dmp

    Filesize

    32KB

  • memory/2036-10-0x00007FFE33700000-0x00007FFE341C1000-memory.dmp

    Filesize

    10.8MB

  • memory/2036-12-0x000001B6636D0000-0x000001B6636E0000-memory.dmp

    Filesize

    64KB

  • memory/2036-11-0x000001B6636D0000-0x000001B6636E0000-memory.dmp

    Filesize

    64KB

  • memory/2036-13-0x000001B6636D0000-0x000001B6636E0000-memory.dmp

    Filesize

    64KB

  • memory/2036-14-0x000001B6636D0000-0x000001B6636E0000-memory.dmp

    Filesize

    64KB

  • memory/2036-15-0x000001B6637D0000-0x000001B6637E2000-memory.dmp

    Filesize

    72KB

  • memory/2036-16-0x000001B664460000-0x000001B66449C000-memory.dmp

    Filesize

    240KB

  • memory/2036-17-0x00007FFE43A60000-0x00007FFE43ACC000-memory.dmp

    Filesize

    432KB

  • memory/2036-19-0x00007FFE33700000-0x00007FFE341C1000-memory.dmp

    Filesize

    10.8MB

  • memory/2036-22-0x000001B6636D0000-0x000001B6636E0000-memory.dmp

    Filesize

    64KB

  • memory/2036-21-0x000001B6636D0000-0x000001B6636E0000-memory.dmp

    Filesize

    64KB

  • memory/2036-20-0x000001B6636D0000-0x000001B6636E0000-memory.dmp

    Filesize

    64KB

  • memory/2036-23-0x000001B6636D0000-0x000001B6636E0000-memory.dmp

    Filesize

    64KB

  • memory/2036-24-0x00007FFE43A60000-0x00007FFE43ACC000-memory.dmp

    Filesize

    432KB

  • memory/2036-34-0x00007FFE43A60000-0x00007FFE43ACC000-memory.dmp

    Filesize

    432KB