Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    125s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2022, 11:36 UTC

General

  • Target

    007b292a4cc1c4f3f3c304354f22116e32dabacae773f59430d3b0ec43626eb8.exe

  • Size

    64KB

  • MD5

    08623ade9b5eba04a18833ed5b4eb7b7

  • SHA1

    72d5c338e435804298b43389ef323a47705691bd

  • SHA256

    007b292a4cc1c4f3f3c304354f22116e32dabacae773f59430d3b0ec43626eb8

  • SHA512

    73c7f6bcf509073b08b7dcdb88e2815f0e76c1812927087d1d9e94d3646f0959e2620fda272bd1bd8a243495c152cc084347679aa29548bc65ee3c472ec3204c

  • SSDEEP

    768:P0aEdFbquo5S1PeA1VYJb+xZIJ5f9GTHIqkKXz8YWhFIF0VDfz84jvsWjyV8fW:caEdFbPiAeeVEbecd9n4Xz8PRFlsUy4W

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\007b292a4cc1c4f3f3c304354f22116e32dabacae773f59430d3b0ec43626eb8.exe
    "C:\Users\Admin\AppData\Local\Temp\007b292a4cc1c4f3f3c304354f22116e32dabacae773f59430d3b0ec43626eb8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Users\Admin\AppData\Local\Temp\007b292a4cc1c4f3f3c304354f22116e32dabacae773f59430d3b0ec43626eb8.exe
      2⤵
        PID:2436

    Network

      No results found
    • 209.197.3.8:80
      260 B
      5
    • 209.197.3.8:80
      322 B
      7
    • 20.189.173.5:443
      322 B
      7
    • 104.80.225.205:443
      322 B
      7
    • 209.197.3.8:80
      322 B
      7
    • 209.197.3.8:80
      322 B
      7
    • 209.197.3.8:80
      322 B
      7
    • 13.107.42.16:443
      322 B
      7
    No results found

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2436-135-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.