Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

18/08/2024, 21:56

240818-1tk41awhmg 3

18/08/2024, 21:52

240818-1rdbdazcml 4

Analysis

  • max time kernel
    122s
  • max time network
    95s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    18/08/2024, 21:56

General

  • Target

    screencapture-chatgpt-2024-08-18-12_20_33-2.png

  • Size

    2.7MB

  • MD5

    fc334642afa9b09c656c1e0c7f0ec95a

  • SHA1

    328b92a2e47beaa10c93c518ceb86ef40bcc1a35

  • SHA256

    85a6005f97166a73e0c63673c541a5da5db97f3b11cdedb144179aa25556d7e5

  • SHA512

    c0bc7bc46ad16b0e00b6e4fcb9ab7a526d847ff769560a2ea800f663c01939a7c8484c57588d937c6189bfe3e7b28e2a4be54c4ca42311fdd35556bc95bb0159

  • SSDEEP

    49152:UtFWcfE26b0+T0vfljzCd+S4rA9p57eFu44qzpGQu:WgcfEPb0QUljzYP4dza

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\screencapture-chatgpt-2024-08-18-12_20_33-2.png
    1⤵
      PID:1700
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /0
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2216

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2216-0-0x00000174C6DA0000-0x00000174C6DA1000-memory.dmp

      Filesize

      4KB

    • memory/2216-2-0x00000174C6DA0000-0x00000174C6DA1000-memory.dmp

      Filesize

      4KB

    • memory/2216-1-0x00000174C6DA0000-0x00000174C6DA1000-memory.dmp

      Filesize

      4KB

    • memory/2216-6-0x00000174C6DA0000-0x00000174C6DA1000-memory.dmp

      Filesize

      4KB

    • memory/2216-7-0x00000174C6DA0000-0x00000174C6DA1000-memory.dmp

      Filesize

      4KB

    • memory/2216-12-0x00000174C6DA0000-0x00000174C6DA1000-memory.dmp

      Filesize

      4KB

    • memory/2216-10-0x00000174C6DA0000-0x00000174C6DA1000-memory.dmp

      Filesize

      4KB

    • memory/2216-9-0x00000174C6DA0000-0x00000174C6DA1000-memory.dmp

      Filesize

      4KB

    • memory/2216-8-0x00000174C6DA0000-0x00000174C6DA1000-memory.dmp

      Filesize

      4KB

    • memory/2216-11-0x00000174C6DA0000-0x00000174C6DA1000-memory.dmp

      Filesize

      4KB