Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    153s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 08:29

General

  • Target

    b4e74f3cf87626692cec02e1078501fae5edd167d3b59ac3f910157ff90466aa.exe

  • Size

    67KB

  • MD5

    b63d1b9c500dc610b6d029052d40552f

  • SHA1

    c3feeb08266722c94930a1ac42595381ca5a7865

  • SHA256

    b4e74f3cf87626692cec02e1078501fae5edd167d3b59ac3f910157ff90466aa

  • SHA512

    a4adc2da65e633a7d1cf942039c82cda1bd3f725e3e21c84988ab8005ca6f206a2c2753e7fd33831bca82faca9d75df45b7164e2da66b918bb617b13c8c3262c

  • SSDEEP

    1536:dvVTskgAtrtihlKc4+Q1iPb6jjjHkh43vooVB6oC2Gm/Ws/n:zWArtibK9/sPyjjA43vXcj2pD/n

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4e74f3cf87626692cec02e1078501fae5edd167d3b59ac3f910157ff90466aa.exe
    "C:\Users\Admin\AppData\Local\Temp\b4e74f3cf87626692cec02e1078501fae5edd167d3b59ac3f910157ff90466aa.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3444
    • C:\Users\Admin\AppData\Local\Temp\b4e74f3cf87626692cec02e1078501fae5edd167d3b59ac3f910157ff90466aa.exe
      ?
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2512

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2512-136-0x0000000010000000-0x000000001000F000-memory.dmp

    Filesize

    60KB

  • memory/2512-139-0x0000000010000000-0x000000001000F000-memory.dmp

    Filesize

    60KB

  • memory/2512-140-0x0000000010000000-0x000000001000F000-memory.dmp

    Filesize

    60KB

  • memory/2512-141-0x0000000001000000-0x000000000100B000-memory.dmp

    Filesize

    44KB

  • memory/2512-142-0x0000000010000000-0x000000001000F000-memory.dmp

    Filesize

    60KB

  • memory/2512-143-0x0000000010000000-0x000000001000F000-memory.dmp

    Filesize

    60KB

  • memory/3444-132-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3444-133-0x0000000001000000-0x000000000100B000-memory.dmp

    Filesize

    44KB

  • memory/3444-135-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB