Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 13:22

General

  • Target

    2669dfa8e01faa447ef5477770b82df62742f43629a63ac007ca16a89ba94d8e.exe

  • Size

    7.5MB

  • MD5

    a33c58349f9686bc034b5ffbf207ce3d

  • SHA1

    58672b5c266a78f2dbfa643f84bba95c487c78c0

  • SHA256

    2669dfa8e01faa447ef5477770b82df62742f43629a63ac007ca16a89ba94d8e

  • SHA512

    aea1cec255d1bea6569da715efb948cd5697e45852163d33b937083f9cf081941027e9c4321a193c1e4625be5f442214df3e3c4513121aec0dfe213f5048510a

  • SSDEEP

    196608:Mx6FCOrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrX:MxxOrrrrrrrrrrrrrrrrrrrrrrrrrrr/

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2669dfa8e01faa447ef5477770b82df62742f43629a63ac007ca16a89ba94d8e.exe
    "C:\Users\Admin\AppData\Local\Temp\2669dfa8e01faa447ef5477770b82df62742f43629a63ac007ca16a89ba94d8e.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4104

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4104-132-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/4104-133-0x0000000002190000-0x00000000021A0000-memory.dmp

    Filesize

    64KB

  • memory/4104-134-0x00000000021A0000-0x00000000021B0000-memory.dmp

    Filesize

    64KB

  • memory/4104-135-0x00000000021B0000-0x00000000021C0000-memory.dmp

    Filesize

    64KB

  • memory/4104-136-0x00000000021D0000-0x00000000021E0000-memory.dmp

    Filesize

    64KB

  • memory/4104-137-0x00000000021E0000-0x00000000021F0000-memory.dmp

    Filesize

    64KB

  • memory/4104-138-0x00000000021F0000-0x0000000002200000-memory.dmp

    Filesize

    64KB

  • memory/4104-139-0x0000000002200000-0x0000000002210000-memory.dmp

    Filesize

    64KB

  • memory/4104-141-0x0000000002230000-0x0000000002240000-memory.dmp

    Filesize

    64KB

  • memory/4104-140-0x0000000002210000-0x0000000002220000-memory.dmp

    Filesize

    64KB

  • memory/4104-142-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/4104-143-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB