Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2024, 11:51 UTC

General

  • Target

    ef2032491253495ad9e2e5c74e8e30c77aa3f23b5d787d1e4408b6b51a9a0097.exe

  • Size

    833KB

  • MD5

    95aebcd3e565cfa0931716c469d8cc8e

  • SHA1

    d5ee92a7a75f7316d93c85b551192241a2617c01

  • SHA256

    ef2032491253495ad9e2e5c74e8e30c77aa3f23b5d787d1e4408b6b51a9a0097

  • SHA512

    f14ee0ac839d2021e91acb90064a15f69e29d0395b02b1b0897d093cf154b8d530f04f14070dacc9548aa8efcf46a59aad42560068b67dffaeceee4d3580dca3

  • SSDEEP

    12288:uU1KRUi2iNmZQcdYI3Nj2G6RTWGlIl4Um0rQg:uU1gUi10l2WCIl46

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef2032491253495ad9e2e5c74e8e30c77aa3f23b5d787d1e4408b6b51a9a0097.exe
    "C:\Users\Admin\AppData\Local\Temp\ef2032491253495ad9e2e5c74e8e30c77aa3f23b5d787d1e4408b6b51a9a0097.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Users\Admin\AppData\Local\Temp\ef2032491253495ad9e2e5c74e8e30c77aa3f23b5d787d1e4408b6b51a9a0097.exe
      "C:\Users\Admin\AppData\Local\Temp\ef2032491253495ad9e2e5c74e8e30c77aa3f23b5d787d1e4408b6b51a9a0097.exe"
      2⤵
        PID:2876
      • C:\Users\Admin\AppData\Local\Temp\ef2032491253495ad9e2e5c74e8e30c77aa3f23b5d787d1e4408b6b51a9a0097.exe
        "C:\Users\Admin\AppData\Local\Temp\ef2032491253495ad9e2e5c74e8e30c77aa3f23b5d787d1e4408b6b51a9a0097.exe"
        2⤵
          PID:2892
        • C:\Users\Admin\AppData\Local\Temp\ef2032491253495ad9e2e5c74e8e30c77aa3f23b5d787d1e4408b6b51a9a0097.exe
          "C:\Users\Admin\AppData\Local\Temp\ef2032491253495ad9e2e5c74e8e30c77aa3f23b5d787d1e4408b6b51a9a0097.exe"
          2⤵
            PID:2896
          • C:\Users\Admin\AppData\Local\Temp\ef2032491253495ad9e2e5c74e8e30c77aa3f23b5d787d1e4408b6b51a9a0097.exe
            "C:\Users\Admin\AppData\Local\Temp\ef2032491253495ad9e2e5c74e8e30c77aa3f23b5d787d1e4408b6b51a9a0097.exe"
            2⤵
              PID:2904
            • C:\Users\Admin\AppData\Local\Temp\ef2032491253495ad9e2e5c74e8e30c77aa3f23b5d787d1e4408b6b51a9a0097.exe
              "C:\Users\Admin\AppData\Local\Temp\ef2032491253495ad9e2e5c74e8e30c77aa3f23b5d787d1e4408b6b51a9a0097.exe"
              2⤵
                PID:2968

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2372-0-0x00000000748CE000-0x00000000748CF000-memory.dmp

              Filesize

              4KB

            • memory/2372-1-0x0000000000390000-0x0000000000466000-memory.dmp

              Filesize

              856KB

            • memory/2372-2-0x00000000748C0000-0x0000000074FAE000-memory.dmp

              Filesize

              6.9MB

            • memory/2372-3-0x0000000000490000-0x000000000049E000-memory.dmp

              Filesize

              56KB

            • memory/2372-4-0x00000000748CE000-0x00000000748CF000-memory.dmp

              Filesize

              4KB

            • memory/2372-5-0x00000000748C0000-0x0000000074FAE000-memory.dmp

              Filesize

              6.9MB

            • memory/2372-6-0x0000000004250000-0x00000000042A2000-memory.dmp

              Filesize

              328KB

            • memory/2372-7-0x00000000748C0000-0x0000000074FAE000-memory.dmp

              Filesize

              6.9MB

            We care about your privacy.

            This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.