Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    03/03/2023, 11:42

General

  • Target

    7bd1a2a1fd806ddb2b2e18a761fa7dfd328b7435c15325df93698f0f96990e23.exe

  • Size

    832KB

  • MD5

    859237f02c68587d74445a32baae2d82

  • SHA1

    793948af2df828971b94281ac86002d78faf783c

  • SHA256

    7bd1a2a1fd806ddb2b2e18a761fa7dfd328b7435c15325df93698f0f96990e23

  • SHA512

    fb4af0d8319d46a8b361136b01aacc9077e9ee4ed63c571e2d8bcdc3c196f3f48bcdc35fd143d0b4afb3839b72def317f1c73b52e9629ce46b71b00c703ba14c

  • SSDEEP

    12288:0+leo/RI0uDrvCESpKEtxydXfbYtpIl039oSXsj:BlD/K0evZSntxylDspgqy

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7bd1a2a1fd806ddb2b2e18a761fa7dfd328b7435c15325df93698f0f96990e23.exe
    "C:\Users\Admin\AppData\Local\Temp\7bd1a2a1fd806ddb2b2e18a761fa7dfd328b7435c15325df93698f0f96990e23.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1448

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1448-54-0x0000000010000000-0x000000001006C000-memory.dmp

    Filesize

    432KB

  • memory/1448-55-0x0000000001DC0000-0x0000000001E00000-memory.dmp

    Filesize

    256KB

  • memory/1448-57-0x0000000001DC0000-0x0000000001E00000-memory.dmp

    Filesize

    256KB

  • memory/1448-58-0x0000000001DC0000-0x0000000001E00000-memory.dmp

    Filesize

    256KB

  • memory/1448-56-0x0000000001DC0000-0x0000000001E00000-memory.dmp

    Filesize

    256KB

  • memory/1448-59-0x0000000001DC0000-0x0000000001E00000-memory.dmp

    Filesize

    256KB

  • memory/1448-61-0x0000000001DC0000-0x0000000001E00000-memory.dmp

    Filesize

    256KB

  • memory/1448-60-0x0000000001DC0000-0x0000000001E00000-memory.dmp

    Filesize

    256KB

  • memory/1448-62-0x0000000001DC0000-0x0000000001E00000-memory.dmp

    Filesize

    256KB

  • memory/1448-63-0x0000000001DC0000-0x0000000001E00000-memory.dmp

    Filesize

    256KB

  • memory/1448-64-0x0000000001DC0000-0x0000000001E00000-memory.dmp

    Filesize

    256KB

  • memory/1448-65-0x0000000010000000-0x000000001006C000-memory.dmp

    Filesize

    432KB

  • memory/1448-66-0x0000000010000000-0x000000001006C000-memory.dmp

    Filesize

    432KB

  • memory/1448-67-0x0000000001DC0000-0x0000000001E00000-memory.dmp

    Filesize

    256KB