Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

25/04/2024, 20:51

240425-znevcsef79 3

25/04/2024, 20:47

240425-zla4dsee5x 7

Analysis

  • max time kernel
    1766s
  • max time network
    1710s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/04/2024, 20:47

General

  • Target

    TotallyNotAimmyV2.exe

  • Size

    6.9MB

  • MD5

    a95cacbb2a6540d97b99c5df61cb5196

  • SHA1

    3949201761754ba240d846b36474f1ca2caebb9a

  • SHA256

    147c739bfecbe74fc1b8e30dfc68b99214160aef76e1b42a360d3a1641b81f91

  • SHA512

    5e080f7e7ec8159471b95766433c3239b93ed7259a5ecb3bc122621c7e589a322c08be19fbbb2b16329325286348fcde67b1432e33d6e0822972ca4d88eb554d

  • SSDEEP

    98304:YHFl2w8cuNdWqX/ItGhbIC8LKVBBRHnZs3gP8i+FbiQZfrkE2N10PHRed9jqjHRl:88cuzd4H2VBBRHsfkUfH2kIkdmt5Ti1

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TotallyNotAimmyV2.exe
    "C:\Users\Admin\AppData\Local\Temp\TotallyNotAimmyV2.exe"
    1⤵
      PID:220
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:5000
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4556

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4556-0-0x0000021DEB4B0000-0x0000021DEB4C0000-memory.dmp

        Filesize

        64KB

      • memory/4556-16-0x0000021DEB5B0000-0x0000021DEB5C0000-memory.dmp

        Filesize

        64KB

      • memory/4556-32-0x0000021DF3920000-0x0000021DF3921000-memory.dmp

        Filesize

        4KB

      • memory/4556-34-0x0000021DF3950000-0x0000021DF3951000-memory.dmp

        Filesize

        4KB

      • memory/4556-35-0x0000021DF3950000-0x0000021DF3951000-memory.dmp

        Filesize

        4KB

      • memory/4556-36-0x0000021DF3A60000-0x0000021DF3A61000-memory.dmp

        Filesize

        4KB