Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26/01/2025, 23:50

General

  • Target

    1da440388475e4e45105a65269eb9e7977107707bac4d4d81d97ca12c3301bfb.exe

  • Size

    1.7MB

  • MD5

    044b989837ddf79ba01b58a404111937

  • SHA1

    605eddb0bf29f52fcbddb1a3b88283a9c075c242

  • SHA256

    1da440388475e4e45105a65269eb9e7977107707bac4d4d81d97ca12c3301bfb

  • SHA512

    30942029e30cdd5d0f219b47d1487fd0508906bf8dccc0ead3e7997faf69477f67bdf2bc13ee4f714c5dbcb8a13bf1f5de0a101edea1ece5dfe3a3e624772822

  • SSDEEP

    24576:thuExtIdE4sW5P6OTyOpp7vAtsXV59JbKb4F32GBp40LtDSVXT5Xv7Kkya8:thid1yOTyKYteb3PFxiXT5Xvr18

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1da440388475e4e45105a65269eb9e7977107707bac4d4d81d97ca12c3301bfb.exe
    "C:\Users\Admin\AppData\Local\Temp\1da440388475e4e45105a65269eb9e7977107707bac4d4d81d97ca12c3301bfb.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2544

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2544-0-0x000007FEF6523000-0x000007FEF6524000-memory.dmp

    Filesize

    4KB

  • memory/2544-1-0x0000000000350000-0x0000000000384000-memory.dmp

    Filesize

    208KB

  • memory/2544-2-0x000007FEF6520000-0x000007FEF6F0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2544-3-0x000007FEF6520000-0x000007FEF6F0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2544-4-0x000007FEF6520000-0x000007FEF6F0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2544-5-0x000007FEF6520000-0x000007FEF6F0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2544-7-0x00000000003A0000-0x00000000003AA000-memory.dmp

    Filesize

    40KB

  • memory/2544-6-0x00000000003A0000-0x00000000003AA000-memory.dmp

    Filesize

    40KB

  • memory/2544-8-0x000007FEF6520000-0x000007FEF6F0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2544-12-0x000007FEF6520000-0x000007FEF6F0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2544-13-0x000007FEF6520000-0x000007FEF6F0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2544-33-0x000007FEF6523000-0x000007FEF6524000-memory.dmp

    Filesize

    4KB

  • memory/2544-37-0x000007FEF6520000-0x000007FEF6F0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2544-38-0x000007FEF6520000-0x000007FEF6F0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2544-39-0x00000000003A0000-0x00000000003AA000-memory.dmp

    Filesize

    40KB

  • memory/2544-40-0x00000000003A0000-0x00000000003AA000-memory.dmp

    Filesize

    40KB

  • memory/2544-41-0x000007FEF6520000-0x000007FEF6F0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2544-42-0x000007FEF6520000-0x000007FEF6F0C000-memory.dmp

    Filesize

    9.9MB