Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/02/2024, 07:16

General

  • Target

    a330ec821324a178a4dd4e82a749bfd9.exe

  • Size

    253KB

  • MD5

    a330ec821324a178a4dd4e82a749bfd9

  • SHA1

    33025ff85e96a2b934298d941eefdd06890ef02c

  • SHA256

    054bc37a3b8fea99308fd8a0f46c0e58da37f83b0e14ac15010837f60cca766a

  • SHA512

    f40f3691d28c846b5dcb4928eb83675b518f70f23d9802506e8ad87ee13012570a8936bff660dbf7cad7dca218c632697ea8a1f3b346e9509cb8b50af6b3aaae

  • SSDEEP

    6144:1pfmJ2G2sOTvYF1/zRhR2scwBk4QLkUqXyVR:O2G0zYDXbRT/UqyVR

Score
6/10

Malware Config

Signatures

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a330ec821324a178a4dd4e82a749bfd9.exe
    "C:\Users\Admin\AppData\Local\Temp\a330ec821324a178a4dd4e82a749bfd9.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:3120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3120-0-0x00000000004D0000-0x00000000004D1000-memory.dmp

    Filesize

    4KB

  • memory/3120-1-0x00000000004E0000-0x00000000004E1000-memory.dmp

    Filesize

    4KB

  • memory/3120-2-0x00000000004F0000-0x00000000004F1000-memory.dmp

    Filesize

    4KB

  • memory/3120-3-0x0000000000500000-0x0000000000501000-memory.dmp

    Filesize

    4KB

  • memory/3120-4-0x0000000000800000-0x0000000000829000-memory.dmp

    Filesize

    164KB

  • memory/3120-5-0x0000000000920000-0x000000000094F000-memory.dmp

    Filesize

    188KB

  • memory/3120-9-0x0000000000800000-0x0000000000829000-memory.dmp

    Filesize

    164KB

  • memory/3120-12-0x0000000000DE0000-0x0000000000E07000-memory.dmp

    Filesize

    156KB

  • memory/3120-16-0x0000000000800000-0x0000000000829000-memory.dmp

    Filesize

    164KB

  • memory/3120-18-0x0000000000800000-0x0000000000829000-memory.dmp

    Filesize

    164KB