Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2022, 21:20

General

  • Target

    5d7d04426bb6ae1263fb64bb08a53de3f27f536bcc6528bbc7026df4b07fb934.exe

  • Size

    1.3MB

  • MD5

    7499bcb7cef235acc3570a4172e75631

  • SHA1

    5ab3eaf69d66acdfdb5b40df41788059417b59a2

  • SHA256

    5d7d04426bb6ae1263fb64bb08a53de3f27f536bcc6528bbc7026df4b07fb934

  • SHA512

    56e4a771756ee0b5b97da0de0fd814959247b63036b36c6ef399c3944954f3566dfd90793d5ad05a58143e85226c199e03bd9c9f8fa85e04bbcb247917ff746b

  • SSDEEP

    24576:grZWgqYWDIoN/3qJuwc/lzZLVdgaHB+wWqwRAP3yglzCyU0O6Pb64SRN:gcnHvwRMLzPPO6PmB

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 26 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d7d04426bb6ae1263fb64bb08a53de3f27f536bcc6528bbc7026df4b07fb934.exe
    "C:\Users\Admin\AppData\Local\Temp\5d7d04426bb6ae1263fb64bb08a53de3f27f536bcc6528bbc7026df4b07fb934.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3152

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3152-132-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3152-134-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3152-135-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3152-136-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3152-137-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3152-139-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3152-141-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3152-143-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3152-145-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3152-147-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3152-149-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3152-151-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3152-153-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3152-155-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3152-157-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3152-159-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3152-161-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3152-163-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3152-165-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3152-167-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3152-169-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3152-171-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3152-173-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3152-175-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3152-177-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3152-178-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB