Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    48s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 12:02

General

  • Target

    3b3bcbe0b362a38f29680f313aa4b5fac0267b6f3f38f3d3756e822d21551ec3.exe

  • Size

    529KB

  • MD5

    16c7c25d6c76be345410aaeae31ce1e5

  • SHA1

    dc7b89fe482d51ad5fc2872310f4d8b73cdb3590

  • SHA256

    3b3bcbe0b362a38f29680f313aa4b5fac0267b6f3f38f3d3756e822d21551ec3

  • SHA512

    8c76fb32cc40bb82d0661663641b6b79498fdb77f97bd00a7eb8895a0424b5ded6ee97311a437c3763811302c105d6935a11be84231626d8e0781b1410f662cf

  • SSDEEP

    12288:UhzIL5sz7oXjnho5WgkB18BTjQ5GFwzLOjKD:TKchoQg0ujQskOK

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b3bcbe0b362a38f29680f313aa4b5fac0267b6f3f38f3d3756e822d21551ec3.exe
    "C:\Users\Admin\AppData\Local\Temp\3b3bcbe0b362a38f29680f313aa4b5fac0267b6f3f38f3d3756e822d21551ec3.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1624
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1372

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1372-64-0x0000000002200000-0x0000000002201000-memory.dmp

      Filesize

      4KB

    • memory/1372-62-0x0000000002200000-0x0000000002201000-memory.dmp

      Filesize

      4KB

    • memory/1372-56-0x0000000002200000-0x0000000002201000-memory.dmp

      Filesize

      4KB

    • memory/1372-57-0x0000000002200000-0x0000000002201000-memory.dmp

      Filesize

      4KB

    • memory/1372-58-0x0000000002200000-0x0000000002201000-memory.dmp

      Filesize

      4KB

    • memory/1372-59-0x0000000002200000-0x0000000002201000-memory.dmp

      Filesize

      4KB

    • memory/1372-66-0x0000000002200000-0x0000000002201000-memory.dmp

      Filesize

      4KB

    • memory/1372-65-0x0000000002200000-0x0000000002201000-memory.dmp

      Filesize

      4KB

    • memory/1372-55-0x0000000002200000-0x0000000002201000-memory.dmp

      Filesize

      4KB

    • memory/1372-71-0x0000000002200000-0x0000000002201000-memory.dmp

      Filesize

      4KB

    • memory/1372-63-0x0000000002200000-0x0000000002201000-memory.dmp

      Filesize

      4KB

    • memory/1372-61-0x0000000002200000-0x0000000002201000-memory.dmp

      Filesize

      4KB

    • memory/1372-60-0x0000000002200000-0x0000000002201000-memory.dmp

      Filesize

      4KB

    • memory/1372-67-0x0000000002200000-0x0000000002201000-memory.dmp

      Filesize

      4KB

    • memory/1372-68-0x0000000002200000-0x0000000002201000-memory.dmp

      Filesize

      4KB

    • memory/1372-69-0x0000000002200000-0x0000000002201000-memory.dmp

      Filesize

      4KB

    • memory/1372-70-0x0000000002200000-0x0000000002201000-memory.dmp

      Filesize

      4KB

    • memory/1624-54-0x0000000074ED1000-0x0000000074ED3000-memory.dmp

      Filesize

      8KB