Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2024, 04:57

General

  • Target

    1cf4daa768af5ef2008a6282f05509e119ea06ed504db8c5e0195f267e62fcff.exe

  • Size

    716KB

  • MD5

    840417da03e0999338c1bf8db09f1c99

  • SHA1

    2d0def3812503ea5ed26c1618852c8e96c0c3a80

  • SHA256

    1cf4daa768af5ef2008a6282f05509e119ea06ed504db8c5e0195f267e62fcff

  • SHA512

    8588a8e7c81596fd831f5ca3ed24470ecff0baf9d5ae37b44f12eeaf37d9b9956310c696083cb06ddf2ba2621644bff6f6575b39013ec4d606411fae1e94b388

  • SSDEEP

    12288:23P/aK2vB+Drj8qAosmqIrKasmgaPMnk/3upsiY5vxgx2vh6XD/9yQZvbe:2/CKABIrj+cC4MnIo7YLfZ65j

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1cf4daa768af5ef2008a6282f05509e119ea06ed504db8c5e0195f267e62fcff.exe
    "C:\Users\Admin\AppData\Local\Temp\1cf4daa768af5ef2008a6282f05509e119ea06ed504db8c5e0195f267e62fcff.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3608
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    PID:4928

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\System32\alg.exe

    Filesize

    661KB

    MD5

    77afb8b81df0b52efb4aa6693fe94218

    SHA1

    e191bec7941139a1e39029a797c90bd394acd6b9

    SHA256

    91d02df7dc0d3d31288ea20b143af7cc343be054d33c593a0298b7cedaab54fe

    SHA512

    338bebb46ddecb21b88c87d554f8f1d20dbe9f84f01def266b2de73c6b242e9dbb6e1a739612fb2cdef6820f84634b3088c434bc11abe6bb96705aa0909349b0

  • memory/3608-0-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/3608-1-0x0000000000AD0000-0x0000000000B37000-memory.dmp

    Filesize

    412KB

  • memory/3608-7-0x0000000000AD0000-0x0000000000B37000-memory.dmp

    Filesize

    412KB

  • memory/3608-6-0x0000000000AD0000-0x0000000000B37000-memory.dmp

    Filesize

    412KB

  • memory/3608-15-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4928-14-0x0000000140000000-0x00000001400AA000-memory.dmp

    Filesize

    680KB

  • memory/4928-16-0x0000000140000000-0x00000001400AA000-memory.dmp

    Filesize

    680KB