Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    299s
  • max time network
    302s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06/05/2023, 00:46

General

  • Target

    magiclauncher.exe

  • Size

    316KB

  • MD5

    91486e9cf43b1431fd9c1076c8b11050

  • SHA1

    47d280aeead54c33abd9be6634421a54dcc71fee

  • SHA256

    14ea176d8537219d6831fa94f1ee2c74518fb9d53773792583a0e20348b2cf7b

  • SHA512

    1722751d9a6abb718408a193e1cece71fa0e1ec22e6f1e8b641dcb00c645ef957ba8219910c4f2c1fc0cf551bde219d676eb193f333afa1dd995206ef64af5fe

  • SSDEEP

    6144:sh5zGLk7ciGhHYW9Q6wULKvmo4qv3TAGGR70D7R:sHzNtGhH0U2vp4qPTAt+p

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\magiclauncher.exe
    "C:\Users\Admin\AppData\Local\Temp\magiclauncher.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
      "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\magiclauncher.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1852

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1764-121-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1852-136-0x00000000015D0000-0x00000000015D1000-memory.dmp

    Filesize

    4KB

  • memory/1852-140-0x00000000015D0000-0x00000000015D1000-memory.dmp

    Filesize

    4KB

  • memory/1852-154-0x00000000015D0000-0x00000000015D1000-memory.dmp

    Filesize

    4KB

  • memory/1852-163-0x00000000015D0000-0x00000000015D1000-memory.dmp

    Filesize

    4KB

  • memory/1852-168-0x00000000015D0000-0x00000000015D1000-memory.dmp

    Filesize

    4KB

  • memory/1852-175-0x00000000015D0000-0x00000000015D1000-memory.dmp

    Filesize

    4KB

  • memory/1852-176-0x00000000015D0000-0x00000000015D1000-memory.dmp

    Filesize

    4KB

  • memory/1852-181-0x00000000015D0000-0x00000000015D1000-memory.dmp

    Filesize

    4KB

  • memory/1852-182-0x00000000015D0000-0x00000000015D1000-memory.dmp

    Filesize

    4KB

  • memory/1852-184-0x00000000015D0000-0x00000000015D1000-memory.dmp

    Filesize

    4KB

  • memory/1852-185-0x00000000015D0000-0x00000000015D1000-memory.dmp

    Filesize

    4KB

  • memory/1852-186-0x00000000015D0000-0x00000000015D1000-memory.dmp

    Filesize

    4KB

  • memory/1852-187-0x00000000015D0000-0x00000000015D1000-memory.dmp

    Filesize

    4KB

  • memory/1852-188-0x00000000015D0000-0x00000000015D1000-memory.dmp

    Filesize

    4KB

  • memory/1852-189-0x00000000015D0000-0x00000000015D1000-memory.dmp

    Filesize

    4KB

  • memory/1852-194-0x00000000015D0000-0x00000000015D1000-memory.dmp

    Filesize

    4KB

  • memory/1852-206-0x00000000015D0000-0x00000000015D1000-memory.dmp

    Filesize

    4KB

  • memory/1852-225-0x00000000015D0000-0x00000000015D1000-memory.dmp

    Filesize

    4KB

  • memory/1852-226-0x00000000015D0000-0x00000000015D1000-memory.dmp

    Filesize

    4KB

  • memory/1852-238-0x00000000015D0000-0x00000000015D1000-memory.dmp

    Filesize

    4KB

  • memory/1852-240-0x00000000015D0000-0x00000000015D1000-memory.dmp

    Filesize

    4KB

  • memory/1852-253-0x00000000015D0000-0x00000000015D1000-memory.dmp

    Filesize

    4KB

  • memory/1852-259-0x00000000015D0000-0x00000000015D1000-memory.dmp

    Filesize

    4KB