Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1514s -
max time network
1455s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 14:57
Static task
static1
Behavioral task
behavioral1
Sample
1167df43-6e1f-1c65-a226-19c599780b5d.eml
Resource
win10v2004-20231215-en
5 signatures
1800 seconds
General
-
Target
1167df43-6e1f-1c65-a226-19c599780b5d.eml
-
Size
13KB
-
MD5
2a4b59c418a8894341ca54983db303c2
-
SHA1
7f3096be35008b693d8fedc229683029077a22b9
-
SHA256
e8d6d815ee22432031cf2a8f4bcdfef0326807d365222c002c8a42935929e360
-
SHA512
e7f176652fea8939e19257614f0e1957a44a6f8e92e125b7587751d562e94ec721eb0bb118b609096ae97d70e39a10152badadd2d6d82b932ad82b83fbe4a818
-
SSDEEP
384:1c3r4TQcSHBb5P7HaX+bD/qSd54BnRtPpsC+pPG/pmPhe4GfDJIUzq:2RHaoqhJU
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\Local Settings OpenWith.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\1167df43-6e1f-1c65-a226-19c599780b5d.eml:OECustomProperty cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 4360 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1940 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\1167df43-6e1f-1c65-a226-19c599780b5d.eml1⤵
- Modifies registry class
- NTFS ADS
PID:1020
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1940
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:704
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4360