Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    153s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/02/2024, 10:31

General

  • Target

    Bolt AIO CRACKED BY [TZCRACKING]/Bolt AIO CRACKED BY [TZCRACKING].exe

  • Size

    922KB

  • MD5

    727188832e9d77e87ebd1aaa12105638

  • SHA1

    0a547ad642b712ab92a189acc776d3758ba163bb

  • SHA256

    567b8af881787af693a08f8c0849d104ea1427e65c5275e554346a40c44bb219

  • SHA512

    5cf2ff673614718723f15d7201c6292fe8be0d24cdd9b2bd210c8155049b2e3045ae4e05be9f09deeafb04d3d4e690696750413576cd675a33d2a85484d36dd8

  • SSDEEP

    24576:GF4fE2pLTyWeFtPtFt6WxWFTxkt6WxWFTxZ:eYLT2rlrj

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bolt AIO CRACKED BY [TZCRACKING]\Bolt AIO CRACKED BY [TZCRACKING].exe
    "C:\Users\Admin\AppData\Local\Temp\Bolt AIO CRACKED BY [TZCRACKING]\Bolt AIO CRACKED BY [TZCRACKING].exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4520-0-0x00000000751A0000-0x0000000075950000-memory.dmp

    Filesize

    7.7MB

  • memory/4520-1-0x0000000000270000-0x000000000035C000-memory.dmp

    Filesize

    944KB

  • memory/4520-2-0x00000000052F0000-0x0000000005894000-memory.dmp

    Filesize

    5.6MB

  • memory/4520-3-0x0000000004DE0000-0x0000000004E72000-memory.dmp

    Filesize

    584KB

  • memory/4520-4-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/4520-5-0x0000000004D60000-0x0000000004D6A000-memory.dmp

    Filesize

    40KB

  • memory/4520-6-0x00000000058A0000-0x00000000059EE000-memory.dmp

    Filesize

    1.3MB

  • memory/4520-7-0x0000000004F10000-0x0000000004F24000-memory.dmp

    Filesize

    80KB

  • memory/4520-8-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/4520-9-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/4520-10-0x00000000098F0000-0x000000000990A000-memory.dmp

    Filesize

    104KB

  • memory/4520-11-0x00000000099C0000-0x0000000009A70000-memory.dmp

    Filesize

    704KB

  • memory/4520-12-0x000000000A2F0000-0x000000000A312000-memory.dmp

    Filesize

    136KB

  • memory/4520-13-0x000000000A320000-0x000000000A674000-memory.dmp

    Filesize

    3.3MB

  • memory/4520-14-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/4520-15-0x00000000751A0000-0x0000000075950000-memory.dmp

    Filesize

    7.7MB

  • memory/4520-16-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/4520-17-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/4520-18-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/4520-19-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB