Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    8s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240214-en
  • resource tags

    arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20/02/2024, 16:51

General

  • Target

    LS/LSload.exe

  • Size

    11.4MB

  • MD5

    101438ab4fe1a97799c73902876004d1

  • SHA1

    e04694acfd96daef068d1679fbf8f618fae82381

  • SHA256

    75c7514469f0ebed66cf5aecb6d5c3960e2d4907e0d31314129c44302c87b813

  • SHA512

    932602b23ff433a763bd62a4e24754f11bc8c1ccea2e1a55a8fce1317ee430112c45876ae558c1eb638ce3d00620cbd854fa55d1f19ef5528b27df3174f921f5

  • SSDEEP

    196608:Q04e61iSoHWd05G7ydBAxnDHzxoM1TR4K1mlS0kVAR0aEoSn6cXlxzBhx3x:7rh5dBAxbuM1TR4+Q2AmlL6eBrx

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LS\LSload.exe
    "C:\Users\Admin\AppData\Local\Temp\LS\LSload.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4488

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4488-0-0x00007FFBFA070000-0x00007FFBFA072000-memory.dmp

    Filesize

    8KB

  • memory/4488-2-0x00007FFBFA090000-0x00007FFBFA092000-memory.dmp

    Filesize

    8KB

  • memory/4488-3-0x00007FFBFA0A0000-0x00007FFBFA0A2000-memory.dmp

    Filesize

    8KB

  • memory/4488-1-0x00007FFBFA080000-0x00007FFBFA082000-memory.dmp

    Filesize

    8KB

  • memory/4488-4-0x00007FFBFA0B0000-0x00007FFBFA0B2000-memory.dmp

    Filesize

    8KB

  • memory/4488-6-0x00007FFBFA0C0000-0x00007FFBFA0C2000-memory.dmp

    Filesize

    8KB

  • memory/4488-7-0x00007FFBFA0D0000-0x00007FFBFA0D2000-memory.dmp

    Filesize

    8KB

  • memory/4488-5-0x0000000000400000-0x0000000001B5D000-memory.dmp

    Filesize

    23.4MB

  • memory/4488-8-0x00007FFBFA0E0000-0x00007FFBFA0E2000-memory.dmp

    Filesize

    8KB

  • memory/4488-9-0x00007FFBFA0F0000-0x00007FFBFA0F2000-memory.dmp

    Filesize

    8KB

  • memory/4488-10-0x00007FFBFA100000-0x00007FFBFA102000-memory.dmp

    Filesize

    8KB

  • memory/4488-11-0x00007FFBFA110000-0x00007FFBFA112000-memory.dmp

    Filesize

    8KB

  • memory/4488-12-0x00007FFBFA120000-0x00007FFBFA122000-memory.dmp

    Filesize

    8KB

  • memory/4488-13-0x00007FFBFA130000-0x00007FFBFA132000-memory.dmp

    Filesize

    8KB

  • memory/4488-14-0x00007FFBFA140000-0x00007FFBFA142000-memory.dmp

    Filesize

    8KB

  • memory/4488-15-0x00007FFBFA150000-0x00007FFBFA152000-memory.dmp

    Filesize

    8KB

  • memory/4488-16-0x0000000000400000-0x0000000001B5D000-memory.dmp

    Filesize

    23.4MB

  • memory/4488-17-0x00007FFBFA160000-0x00007FFBFA162000-memory.dmp

    Filesize

    8KB

  • memory/4488-18-0x00007FFBFA170000-0x00007FFBFA172000-memory.dmp

    Filesize

    8KB

  • memory/4488-19-0x00007FFBFA180000-0x00007FFBFA182000-memory.dmp

    Filesize

    8KB

  • memory/4488-20-0x00007FFBFA190000-0x00007FFBFA192000-memory.dmp

    Filesize

    8KB

  • memory/4488-26-0x0000000000400000-0x0000000001B5D000-memory.dmp

    Filesize

    23.4MB