Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    103s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:08

General

  • Target

    12085ebb04414916835a2dbcd2cdfa95.exe

  • Size

    27.7MB

  • MD5

    12085ebb04414916835a2dbcd2cdfa95

  • SHA1

    0d38b164e8346878d58c8abfc0bddfe558c7880a

  • SHA256

    5c2c1e644e9ce1a00f3b7893bdc1c49c66f0a7e8f7f9f655a1b238cc589cfbba

  • SHA512

    ef256cd5694c5d336fdffd7b9d1c6bffe271f765c5f6b25e5722a7eb9095d719b18505ba9e47d848a5131cf842ed50f9dcca0eb9e43f1f7a4a1a629aa74b1108

  • SSDEEP

    393216:BAjXuTDSvfGJ8uGAAPXV8D4hSBG7LJQkL1JnsXjRBZcs5eH9MKgzUa6n5Q6LEBwS:4XuCHGJTk6G76kgFVM9MKbb6vpJ3ckMe

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12085ebb04414916835a2dbcd2cdfa95.exe
    "C:\Users\Admin\AppData\Local\Temp\12085ebb04414916835a2dbcd2cdfa95.exe"
    1⤵
    • Drops startup file
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks.exe" /create /tn AccSys /tr "C:\ProgramData\NETFLIX2025\NET25" /st 06:13 /du 23:59 /sc daily /ri 1 /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:1740
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp978D.tmp.cmd""
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1780
      • C:\Windows\SysWOW64\timeout.exe
        timeout 6
        3⤵
        • System Location Discovery: System Language Discovery
        • Delays execution with timeout.exe
        PID:3292
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp978D.tmp.cmd

    Filesize

    184B

    MD5

    58ea8e6eb924ef7b3f61810112d91d57

    SHA1

    37ca48bc515e72a7d0c6ff62e2ada89af4de1ea8

    SHA256

    1333e928d434a11b171d9a413f4de035198121d2ee496146ef065d8466a96cce

    SHA512

    17e9cee854842affbc068439467919e100e36db4dece8fb98dfadf8bde50364787f5d0e4e360393e9ee44cf500a9428122ad8cc20711148355048c713f1de5d4

  • memory/2904-0-0x000000007465E000-0x000000007465F000-memory.dmp

    Filesize

    4KB

  • memory/2904-1-0x0000000000DF0000-0x0000000000FF0000-memory.dmp

    Filesize

    2.0MB

  • memory/2904-2-0x0000000005E60000-0x0000000006404000-memory.dmp

    Filesize

    5.6MB

  • memory/2904-3-0x00000000058B0000-0x0000000005942000-memory.dmp

    Filesize

    584KB