Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/05/2024, 03:24

General

  • Target

    ff4d5e79b332e859a31b7a3c8fb5a9844adbb006ce562d4ab006b7c2770d9854.exe

  • Size

    7.8MB

  • MD5

    6b44a8d699ecd4fb78e9a05a839c79fd

  • SHA1

    c890812975459401aa19ad317e1e106ef74101c5

  • SHA256

    ff4d5e79b332e859a31b7a3c8fb5a9844adbb006ce562d4ab006b7c2770d9854

  • SHA512

    ba62b16a9d0bf0af69eb8838ac31ff221b0507f9f41b466e618f9aa6f620469ba6fd0d95959d192a8f7cc0346589e1c780eca2f38178ef8ba688409b9de373ff

  • SSDEEP

    196608:v2+ZBdhQiexKbuXeR488Wxv/Kwf1ugFDah8dELt9/qI+tcg:9ExKuXeR4FWES7ZahHJ9iI

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff4d5e79b332e859a31b7a3c8fb5a9844adbb006ce562d4ab006b7c2770d9854.exe
    "C:\Users\Admin\AppData\Local\Temp\ff4d5e79b332e859a31b7a3c8fb5a9844adbb006ce562d4ab006b7c2770d9854.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/628-1-0x0000000001B00000-0x0000000001B01000-memory.dmp

    Filesize

    4KB

  • memory/628-0-0x000000000079C000-0x0000000000BF3000-memory.dmp

    Filesize

    4.3MB

  • memory/628-8-0x00000000032C0000-0x00000000032C1000-memory.dmp

    Filesize

    4KB

  • memory/628-7-0x00000000032B0000-0x00000000032B1000-memory.dmp

    Filesize

    4KB

  • memory/628-6-0x00000000032A0000-0x00000000032A1000-memory.dmp

    Filesize

    4KB

  • memory/628-5-0x0000000003290000-0x0000000003291000-memory.dmp

    Filesize

    4KB

  • memory/628-4-0x0000000003280000-0x0000000003281000-memory.dmp

    Filesize

    4KB

  • memory/628-3-0x0000000003270000-0x0000000003271000-memory.dmp

    Filesize

    4KB

  • memory/628-2-0x0000000003240000-0x0000000003241000-memory.dmp

    Filesize

    4KB

  • memory/628-12-0x0000000000400000-0x00000000013B5000-memory.dmp

    Filesize

    15.7MB

  • memory/628-13-0x0000000000400000-0x00000000013B5000-memory.dmp

    Filesize

    15.7MB

  • memory/628-14-0x0000000000400000-0x00000000013B5000-memory.dmp

    Filesize

    15.7MB

  • memory/628-15-0x0000000000400000-0x00000000013B5000-memory.dmp

    Filesize

    15.7MB

  • memory/628-16-0x0000000000400000-0x00000000013B5000-memory.dmp

    Filesize

    15.7MB

  • memory/628-18-0x0000000000400000-0x00000000013B5000-memory.dmp

    Filesize

    15.7MB

  • memory/628-19-0x0000000000400000-0x00000000013B5000-memory.dmp

    Filesize

    15.7MB

  • memory/628-20-0x000000000079C000-0x0000000000BF3000-memory.dmp

    Filesize

    4.3MB