Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    87s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    08/05/2024, 18:40

General

  • Target

    putin.exe

  • Size

    1.3MB

  • MD5

    1181b60d1b2f613141858e09f5baed74

  • SHA1

    c1ad5d6e20153c60310059110d2981c5551f32f5

  • SHA256

    a54871a86ea0ab334357133661e3e5b36e8b03e91f6037639315e109499339a7

  • SHA512

    1aec1047cd576325e2ceb62e98a1e1349e3cf2fdd2393cb22f36af253f66df426fbf94e697e43d4ddcff1d2f6be1c930c18632c4ebdb5c9f312879a451250117

  • SSDEEP

    24576:ZXeNLwOs5l6z5vsVq3OnxTHZscDtY2t43QeUFZP7VgK:VeQlmsV/dlDFXeUFB7VL

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 56 IoCs
  • Suspicious use of SendNotifyMessage 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\putin.exe
    "C:\Users\Admin\AppData\Local\Temp\putin.exe"
    1⤵
      PID:4100
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /0
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4772

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4100-0-0x00000000750EE000-0x00000000750EF000-memory.dmp

      Filesize

      4KB

    • memory/4100-1-0x0000000000710000-0x000000000085C000-memory.dmp

      Filesize

      1.3MB

    • memory/4100-2-0x0000000005960000-0x0000000005F06000-memory.dmp

      Filesize

      5.6MB

    • memory/4100-3-0x00000000053B0000-0x0000000005442000-memory.dmp

      Filesize

      584KB

    • memory/4100-4-0x00000000054A0000-0x00000000054AA000-memory.dmp

      Filesize

      40KB

    • memory/4100-5-0x00000000750E0000-0x0000000075891000-memory.dmp

      Filesize

      7.7MB

    • memory/4100-6-0x00000000750EE000-0x00000000750EF000-memory.dmp

      Filesize

      4KB

    • memory/4100-7-0x00000000750E0000-0x0000000075891000-memory.dmp

      Filesize

      7.7MB

    • memory/4772-10-0x0000025F4B710000-0x0000025F4B711000-memory.dmp

      Filesize

      4KB

    • memory/4772-9-0x0000025F4B710000-0x0000025F4B711000-memory.dmp

      Filesize

      4KB

    • memory/4772-8-0x0000025F4B710000-0x0000025F4B711000-memory.dmp

      Filesize

      4KB

    • memory/4772-14-0x0000025F4B710000-0x0000025F4B711000-memory.dmp

      Filesize

      4KB

    • memory/4772-20-0x0000025F4B710000-0x0000025F4B711000-memory.dmp

      Filesize

      4KB

    • memory/4772-19-0x0000025F4B710000-0x0000025F4B711000-memory.dmp

      Filesize

      4KB

    • memory/4772-18-0x0000025F4B710000-0x0000025F4B711000-memory.dmp

      Filesize

      4KB

    • memory/4772-17-0x0000025F4B710000-0x0000025F4B711000-memory.dmp

      Filesize

      4KB

    • memory/4772-16-0x0000025F4B710000-0x0000025F4B711000-memory.dmp

      Filesize

      4KB

    • memory/4772-15-0x0000025F4B710000-0x0000025F4B711000-memory.dmp

      Filesize

      4KB