Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    24s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    19/03/2023, 16:35 UTC

General

  • Target

    SecuriteInfo.com.Trojan.GenericKD.65986477.30295.30638.exe

  • Size

    7.5MB

  • MD5

    f5d957a42f578847664cacb8a4c3d695

  • SHA1

    5affbea912936570480b7a6a0a7e67c6a2f62ec9

  • SHA256

    00978d16ecc2b0f6cf039b3bef087a8542d2092d8f95f36104f2329f7bf362dc

  • SHA512

    07821df782858665c810e959e92f78de4af56e8d090069c5637537338244f9348f7a878bff95d72620b4c092fd97cfb2d15ffe1c097c36a86399a478ea406980

  • SSDEEP

    196608:ZOtzW0BrGc/4GmLcBh8YSZIEqsyZr2caC78:kVW6Gc//B/xEh+a

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.65986477.30295.30638.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.65986477.30295.30638.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:2032

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2032-55-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB

  • memory/2032-54-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB

  • memory/2032-56-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB

  • memory/2032-57-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/2032-58-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/2032-59-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/2032-60-0x0000000000150000-0x0000000000151000-memory.dmp

    Filesize

    4KB

  • memory/2032-61-0x0000000000150000-0x0000000000151000-memory.dmp

    Filesize

    4KB

  • memory/2032-65-0x0000000000160000-0x0000000000161000-memory.dmp

    Filesize

    4KB

  • memory/2032-64-0x0000000000160000-0x0000000000161000-memory.dmp

    Filesize

    4KB

  • memory/2032-63-0x0000000000160000-0x0000000000161000-memory.dmp

    Filesize

    4KB

  • memory/2032-62-0x0000000000150000-0x0000000000151000-memory.dmp

    Filesize

    4KB

  • memory/2032-67-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB

  • memory/2032-68-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB

  • memory/2032-70-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB

  • memory/2032-71-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB

  • memory/2032-73-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2032-74-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2032-76-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/2032-77-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/2032-78-0x00000000003B0000-0x0000000000F60000-memory.dmp

    Filesize

    11.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.