Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/04/2024, 01:59

General

  • Target

    d0ccad2452cc0124d95214f9a9c5e4df9d842f97c6389c6e01baa0916306ad87.exe

  • Size

    198KB

  • MD5

    1aa6f499158d4b7141db67d7038cda8d

  • SHA1

    5947aa44d3c8e5d3e31667553dbdc104426b57ee

  • SHA256

    d0ccad2452cc0124d95214f9a9c5e4df9d842f97c6389c6e01baa0916306ad87

  • SHA512

    7051af4236d7eec714d5874bbf10643a306fef8361df682a642151c87a1fc59a03ede0cbc2b41516d58c294d120188df3e62045717fda6377765ec7c056033cd

  • SSDEEP

    3072:cNOEmZoEfUHeZbe3+xW3Yf+83C63QU8rgP6A6NL6AW9SI1eBzKR:c4BZ6S5W3kV3p3QU9iA8LvaSseBO

Score
7/10

Malware Config

Signatures

  • Unexpected DNS network traffic destination 6 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0ccad2452cc0124d95214f9a9c5e4df9d842f97c6389c6e01baa0916306ad87.exe
    "C:\Users\Admin\AppData\Local\Temp\d0ccad2452cc0124d95214f9a9c5e4df9d842f97c6389c6e01baa0916306ad87.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3928
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe" /c wmic path win32_computersystemproduct get uuid
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:644
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic path win32_computersystemproduct get uuid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3884
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe" /c nslookup myip.opendns.com. resolver1.opendns.com
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4708
      • C:\Windows\system32\nslookup.exe
        nslookup myip.opendns.com. resolver1.opendns.com
        3⤵
          PID:2140
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /c nslookup myip.opendns.com. resolver1.opendns.com
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1556
        • C:\Windows\system32\nslookup.exe
          nslookup myip.opendns.com. resolver1.opendns.com
          3⤵
            PID:4180

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3928-0-0x000001DCEA230000-0x000001DCEA23C000-memory.dmp

        Filesize

        48KB

      • memory/3928-1-0x00007FFAB7880000-0x00007FFAB8341000-memory.dmp

        Filesize

        10.8MB

      • memory/3928-2-0x000001DCEB040000-0x000001DCEB568000-memory.dmp

        Filesize

        5.2MB

      • memory/3928-3-0x000001DCEAB00000-0x000001DCEAB10000-memory.dmp

        Filesize

        64KB

      • memory/3928-5-0x000001DCEAB00000-0x000001DCEAB10000-memory.dmp

        Filesize

        64KB

      • memory/3928-4-0x000001DCEAB00000-0x000001DCEAB10000-memory.dmp

        Filesize

        64KB

      • memory/3928-6-0x00007FFAB7880000-0x00007FFAB8341000-memory.dmp

        Filesize

        10.8MB

      • memory/3928-7-0x000001DCEAB00000-0x000001DCEAB10000-memory.dmp

        Filesize

        64KB

      • memory/3928-8-0x000001DCEAB00000-0x000001DCEAB10000-memory.dmp

        Filesize

        64KB

      • memory/3928-9-0x000001DCEAB00000-0x000001DCEAB10000-memory.dmp

        Filesize

        64KB