Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 08:08

General

  • Target

    44435.exe

  • Size

    62KB

  • MD5

    f0eccac3a007ffe9cc85d46bc8d5af97

  • SHA1

    f82fcd4a67b3a74684b3f0f921959065c7b41d10

  • SHA256

    78fec2d4b4193d10fb81dfa4fb2c2d583fc97ede84d8c5ddd161508d5cb378bd

  • SHA512

    0f30fa8b2bbd4eedac4d89c59288e9513904fa792cd62f5197f50ee63c10c43f5af1ea28eaa7b01e1de7720f435d048174a56aab492cd2934584e3703946a2ea

  • SSDEEP

    1536:AvCT3nPCUlrsobbEp3OT2iXAOTqOTSHpiF:h3PtgobEMKiXNbHF

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2756
      • C:\Users\Admin\AppData\Local\Temp\44435.exe
        "C:\Users\Admin\AppData\Local\Temp\44435.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1804

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1804-132-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1804-133-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/1804-135-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1804-136-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/2756-134-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB