Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    30s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    03/06/2024, 02:19

General

  • Target

    هاذي المره بتصيد يعني بتصيد.exe

  • Size

    475KB

  • MD5

    8707cedce42309f5c50fcad7c895bbd7

  • SHA1

    46feb0b7f6770232c283814e9ecd4cc5a4656bd3

  • SHA256

    368978156afdfdbd57c880574758eae17afbb7dd436eec19f756a3e9d25a3854

  • SHA512

    ff96e5aadaf4742b41025ae2d898f6f3f03d841f0af6267887cce202ff8db1ef27b50214f651cb289b45fdc95d7225a0c1f577b73375949cae0ac950e80fa2ea

  • SSDEEP

    6144:KVYR57NLcB8wWtw1yHZHwJuS6xw17T4lP5DOGbdU7tIQd3sLbJ+sum7r8TBxG:53N+t+wx/62yD3bKJS3Z7r

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\هاذي المره بتصيد يعني بتصيد.exe
    "C:\Users\Admin\AppData\Local\Temp\هاذي المره بتصيد يعني بتصيد.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

    Filesize

    14KB

    MD5

    43cb3dd711fabb160479d7fa40bfb35f

    SHA1

    82ed732ba150138ae61e9558bbac1ae1ba3c6a68

    SHA256

    3cb3d653a2c7da68b1d9debf2dcd3620df9198f160a3009acc47e9226f366514

    SHA512

    367922a35f4ec982a302f2957a6d04da66a16034d42bad32010a84358a3dfe3ed21ac46764560588b96bfe435341a8b9acd5501ad98237280d7bb439e6556e37

  • memory/2480-6-0x0000000004EF0000-0x0000000004EFA000-memory.dmp

    Filesize

    40KB

  • memory/2480-8-0x0000000074690000-0x0000000074E41000-memory.dmp

    Filesize

    7.7MB

  • memory/2480-3-0x0000000074690000-0x0000000074E41000-memory.dmp

    Filesize

    7.7MB

  • memory/2480-4-0x0000000005780000-0x0000000005D26000-memory.dmp

    Filesize

    5.6MB

  • memory/2480-5-0x0000000004F60000-0x0000000004FF2000-memory.dmp

    Filesize

    584KB

  • memory/2480-0-0x000000007469E000-0x000000007469F000-memory.dmp

    Filesize

    4KB

  • memory/2480-7-0x0000000074690000-0x0000000074E41000-memory.dmp

    Filesize

    7.7MB

  • memory/2480-2-0x0000000074690000-0x0000000074E41000-memory.dmp

    Filesize

    7.7MB

  • memory/2480-9-0x000000007469E000-0x000000007469F000-memory.dmp

    Filesize

    4KB

  • memory/2480-10-0x0000000074690000-0x0000000074E41000-memory.dmp

    Filesize

    7.7MB

  • memory/2480-11-0x0000000074690000-0x0000000074E41000-memory.dmp

    Filesize

    7.7MB

  • memory/2480-1-0x0000000000310000-0x000000000038C000-memory.dmp

    Filesize

    496KB

  • memory/2480-17-0x0000000074690000-0x0000000074E41000-memory.dmp

    Filesize

    7.7MB

  • memory/2480-18-0x0000000074690000-0x0000000074E41000-memory.dmp

    Filesize

    7.7MB