Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    15s
  • max time network
    7s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2024, 18:20

General

  • Target

    Stand.Launchpad (1).exe

  • Size

    74KB

  • MD5

    3219a95467be9ab4b8e26586e0c7ce06

  • SHA1

    882d9fbccc090c5e05a05e27cecaa00a6d31cb7f

  • SHA256

    2d3f8de8b5d596e953d467cd8079070abe5e51d3deca159a3776f56965d56222

  • SHA512

    aae5a10f3d9485abf5ac2ee178724680e0722434ac2c57af968dccd46bfdc7f6d9f7aea34d82367a28276b2b5977ae321f4a1af1b51e3eba403ce35fcd110c5c

  • SSDEEP

    768:mgI1eZXaHQBaKI4MjjMlvbmndydf9tdZIgiMDeLPPcc5tul5scYhb:w1tYMzMBbmnItdZIgvQ3Ol5scmb

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Stand.Launchpad (1).exe
    "C:\Users\Admin\AppData\Local\Temp\Stand.Launchpad (1).exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2836

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2836-0-0x00007FFE59D73000-0x00007FFE59D75000-memory.dmp

    Filesize

    8KB

  • memory/2836-1-0x000001E09A300000-0x000001E09A316000-memory.dmp

    Filesize

    88KB

  • memory/2836-2-0x00007FFE59D70000-0x00007FFE5A831000-memory.dmp

    Filesize

    10.8MB

  • memory/2836-5-0x00007FFE59D70000-0x00007FFE5A831000-memory.dmp

    Filesize

    10.8MB

  • memory/2836-6-0x00007FFE59D70000-0x00007FFE5A831000-memory.dmp

    Filesize

    10.8MB

  • memory/2836-9-0x00007FFE59D73000-0x00007FFE59D75000-memory.dmp

    Filesize

    8KB

  • memory/2836-10-0x00007FFE59D70000-0x00007FFE5A831000-memory.dmp

    Filesize

    10.8MB

  • memory/2836-11-0x00007FFE59D70000-0x00007FFE5A831000-memory.dmp

    Filesize

    10.8MB