Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    43s
  • max time network
    50s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/06/2024, 14:04

General

  • Target

    1.exe

  • Size

    47KB

  • MD5

    f0995b44576bca55173e4b2db8eb57f2

  • SHA1

    f7f2e4d7f3c0b3408015296821780a25d017f95a

  • SHA256

    e52af6d68dc71c742a4889834e4eeafc94d816835086df93c1b7106564c0ac16

  • SHA512

    f72886b477fb346462ddea280e34ff484a658a1c818d48355f2f6b0eb234f3604260c909b5c9c8d7aa88f3dc31998793dcd8acf1f34bb16667e4b79f7d5151b6

  • SSDEEP

    768:9yLqzcQ8zwtHEBbGoaPbs9IKRQ5qo2GLQdJVw4ztOyjg5YCtKO:cLqzcQ5kJxWpKRfzdJfIyjg57K

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1.exe
    "C:\Users\Admin\AppData\Local\Temp\1.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    PID:1464
  • C:\Windows\system32\msinfo32.exe
    "C:\Windows\system32\msinfo32.exe" "C:\Users\Admin\Desktop\StopGroup.nfo"
    1⤵
    • Checks SCSI registry key(s)
    • Enumerates system info in registry
    • Suspicious behavior: GetForegroundWindowSpam
    PID:5048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1464-0-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB