Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    31s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/01/2024, 01:00

Errors

Reason
Machine shutdown

General

  • Target

    AkuTheSlime4.exe

  • Size

    243KB

  • MD5

    5a908bd0fb8970f5bcee95d31aa1b972

  • SHA1

    cad8de8d2ada987ce3ebe99e4c10ee60baee33f2

  • SHA256

    a90ffdba1be5e8c98a4c083b81d9b1f8346410fbaf3dd511dc34c01bde3ec20e

  • SHA512

    02226e6080138546366e23f2ce0363da3f90477605e1684ff8d5a23f87bbf90347c0780ac4da978e1543d49e65d6249a94aa4f143eb701dd5ada59bfbb2ce724

  • SSDEEP

    6144:YqPatttk5x37tttttt67bhOSKfU0wOtTiEqOpPXccV+RGRNM:YqP15x3cB9060PX3cRG

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AkuTheSlime4.exe
    "C:\Users\Admin\AppData\Local\Temp\AkuTheSlime4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\cmd.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2076
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\msg.vbs"
        3⤵
          PID:2748
        • C:\Windows\system32\shutdown.exe
          shutdown /r
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2784
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x0
      1⤵
        PID:2952
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x1
        1⤵
          PID:500

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\cmd.bat

          Filesize

          108B

          MD5

          28256a962767b1954e50801af30baa3d

          SHA1

          06938a7ea7ef6f1d45732b34cf8583879c8b5011

          SHA256

          2d18064414596c6bebc504d3b2e61ad263356d19685cb2fb7cee5ca3d579374c

          SHA512

          6a601b0b33dacbd75723f59a1d272d48778cff42302e564b79de4ea0263738f239bba68171fdd7ce72387b73324b1e80ea49ff91a0740730d4d5ef7da3e999af

        • C:\Users\Admin\AppData\Local\Temp\msg.vbs

          Filesize

          64B

          MD5

          a9a0c15d9af10b6ea119975f99bf453d

          SHA1

          4966878bf0ef1bfbe0bc6e4e48c8f8fa8442248e

          SHA256

          b08c5aa5783b5286d31a013ef78eb7cc4f1a244985776fa0752874c8fff2cda9

          SHA512

          2747e49aacaf0000774cdfe580db437469f5d99e6f3bcd6963acf6d87757ed98fb1fb6d19ce713f98fcaa42eb7e61539556066eb47ff9de5b37a08a96323f5db

        • memory/500-47-0x0000000002A90000-0x0000000002A91000-memory.dmp

          Filesize

          4KB

        • memory/2228-0-0x0000000000F40000-0x0000000000F82000-memory.dmp

          Filesize

          264KB

        • memory/2228-8-0x000007FEF5760000-0x000007FEF614C000-memory.dmp

          Filesize

          9.9MB

        • memory/2228-14-0x000007FEF5760000-0x000007FEF614C000-memory.dmp

          Filesize

          9.9MB

        • memory/2952-46-0x0000000002D90000-0x0000000002D91000-memory.dmp

          Filesize

          4KB