Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    42s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 14:49

General

  • Target

    c300d9b988588e6716ec50a6eb3e0ca639bc1ff8e822cc1f36f1596508db2ac6.exe

  • Size

    95KB

  • MD5

    8549ea586fab3f3f660dab770df14145

  • SHA1

    045129619baab09864b2a5dfa799fdc1795be56f

  • SHA256

    c300d9b988588e6716ec50a6eb3e0ca639bc1ff8e822cc1f36f1596508db2ac6

  • SHA512

    247d3b86e9d90979e515d60e2fa96d0d49afe07807d7ed09032b282c5d3b067f62944d005826030b1cc53ad4a6df8dcc2a1c2158ad6dd3d9c682e70bd3ba87b2

  • SSDEEP

    1536:h2mv3vYd0GyB/IZuuSo7FBBBMjatGbMmnFJfwIU008lM75KWrL77m35V:vYYB/OqohBLztNmPQ51rLE5

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1248
      • C:\Users\Admin\AppData\Local\Temp\c300d9b988588e6716ec50a6eb3e0ca639bc1ff8e822cc1f36f1596508db2ac6.exe
        "C:\Users\Admin\AppData\Local\Temp\c300d9b988588e6716ec50a6eb3e0ca639bc1ff8e822cc1f36f1596508db2ac6.exe"
        2⤵
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:1664

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1248-55-0x0000000002A60000-0x0000000002A6C000-memory.dmp

      Filesize

      48KB

    • memory/1248-57-0x0000000002A60000-0x0000000002A6C000-memory.dmp

      Filesize

      48KB

    • memory/1664-54-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/1664-59-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB

    • memory/1664-60-0x00000000002C0000-0x00000000002DA000-memory.dmp

      Filesize

      104KB