Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18/03/2024, 20:22

General

  • Target

    d4709bf25d80878c5dcdbfbe7472095f.exe

  • Size

    55KB

  • MD5

    d4709bf25d80878c5dcdbfbe7472095f

  • SHA1

    389940797735854a92e342947508a46471a51aa8

  • SHA256

    794ec17f9cf02cde1f0b82cabc0895747939c39b09cbc1c7eed06eb898037456

  • SHA512

    9d285f5d299b5410839389887435acf06e2005ce4b8411b632789535a2ca13ad70ee5209fa1e239c81b85987ae39870acbdd4964e6c64e841f3586d35b38a18e

  • SSDEEP

    768:TDC8h57dEp5ta+hO5MG+a0uM7OaC0lmi1z5J8ryeqUpsTjNwd4aU:P9dEDG9+I0lxHaLsivU

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
    "C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1556
    • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
      C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
        C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2464
        • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
          C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2580
          • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
            C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2028
            • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
              C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
              6⤵
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2624
              • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2396
                • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                  C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                  8⤵
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3008
                  • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                    C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                    9⤵
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:944
                    • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                      C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                      10⤵
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2016
                      • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                        C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                        11⤵
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:908
                        • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                          C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                          12⤵
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:764
                          • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                            C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                            13⤵
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:588
                            • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                              C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                              14⤵
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:2060
                              • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                15⤵
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:1504
                                • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                  C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                  16⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  PID:1132
                                  • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                    C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                    17⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of WriteProcessMemory
                                    PID:1624
                                    • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                      C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                      18⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of WriteProcessMemory
                                      PID:1756
                                      • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                        C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                        19⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of WriteProcessMemory
                                        PID:3000
                                        • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                          C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                          20⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of WriteProcessMemory
                                          PID:760
                                          • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                            C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                            21⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Suspicious use of WriteProcessMemory
                                            PID:1588
                                            • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                              C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                              22⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of WriteProcessMemory
                                              PID:1704
                                              • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                                C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                                23⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1524
                                                • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                                  C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                                  24⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2760
                                                  • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                                    C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                                    25⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2096
                                                    • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                                      C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                                      26⤵
                                                        PID:2644

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/588-49-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/588-47-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/588-46-0x0000000001E10000-0x0000000001E90000-memory.dmp

      Filesize

      512KB

    • memory/588-45-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/764-44-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/764-43-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/764-42-0x0000000001D40000-0x0000000001DC0000-memory.dmp

      Filesize

      512KB

    • memory/764-40-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/908-38-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/908-41-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/908-39-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/944-32-0x0000000001ED0000-0x0000000001F50000-memory.dmp

      Filesize

      512KB

    • memory/944-35-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/944-31-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/1132-59-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/1132-58-0x0000000001F00000-0x0000000001F80000-memory.dmp

      Filesize

      512KB

    • memory/1132-56-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/1504-53-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/1504-57-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/1504-55-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/1504-54-0x0000000001DC0000-0x0000000001E40000-memory.dmp

      Filesize

      512KB

    • memory/1556-3-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/1556-2-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/1556-1-0x0000000001F40000-0x0000000001FC0000-memory.dmp

      Filesize

      512KB

    • memory/1556-0-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/1624-62-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/1624-60-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/1624-61-0x0000000002010000-0x0000000002090000-memory.dmp

      Filesize

      512KB

    • memory/1756-63-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2016-36-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2016-33-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2016-37-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2016-34-0x0000000001F50000-0x0000000001FD0000-memory.dmp

      Filesize

      512KB

    • memory/2028-15-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2028-16-0x0000000001D10000-0x0000000001D90000-memory.dmp

      Filesize

      512KB

    • memory/2028-17-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2028-20-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2060-52-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2060-48-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2060-51-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2060-50-0x0000000001F00000-0x0000000001F80000-memory.dmp

      Filesize

      512KB

    • memory/2300-4-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2300-7-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2300-6-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2300-5-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/2396-25-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2396-26-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2396-23-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2396-24-0x0000000001F30000-0x0000000001FB0000-memory.dmp

      Filesize

      512KB

    • memory/2464-12-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2464-8-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2464-10-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2464-9-0x0000000001EB0000-0x0000000001F30000-memory.dmp

      Filesize

      512KB

    • memory/2580-13-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2580-11-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2580-14-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2624-18-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2624-19-0x0000000001FA0000-0x0000000002020000-memory.dmp

      Filesize

      512KB

    • memory/2624-22-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/2624-21-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/3008-30-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/3008-27-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB

    • memory/3008-28-0x0000000001F10000-0x0000000001F90000-memory.dmp

      Filesize

      512KB

    • memory/3008-29-0x000007FEF51F0000-0x000007FEF5B8D000-memory.dmp

      Filesize

      9.6MB