Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    29s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    28/06/2023, 19:32

General

  • Target

    3cfb8818fba2802bfcd1d1e2aa8d2b699c67bc725cf5ba9246fa40fae688c9fb.exe

  • Size

    3.9MB

  • MD5

    600deba38bac15a0d18779f407fa4f9c

  • SHA1

    15c1e831ebc35ecaec18fece1be56b96e5e6fa78

  • SHA256

    3cfb8818fba2802bfcd1d1e2aa8d2b699c67bc725cf5ba9246fa40fae688c9fb

  • SHA512

    18427399b03a616e87ad16bdc69685d8be22ae61a46645bd3e3474431d2c17d612fb6d66ac05d80edabed06b670004358676e3589eb95879f2eb5760ab891341

  • SSDEEP

    49152:BQhweb+TSMK7lecM30sNsdoJ18WMTy/GIDHVVvYcIKS6FBZO+twl/qn:He3MK7leN30fdopFlwl/qn

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 26 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3cfb8818fba2802bfcd1d1e2aa8d2b699c67bc725cf5ba9246fa40fae688c9fb.exe
    "C:\Users\Admin\AppData\Local\Temp\3cfb8818fba2802bfcd1d1e2aa8d2b699c67bc725cf5ba9246fa40fae688c9fb.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2036

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2036-54-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2036-55-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2036-58-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2036-60-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2036-62-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2036-64-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2036-66-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2036-70-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2036-72-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2036-74-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2036-76-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2036-78-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2036-80-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2036-82-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2036-68-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2036-56-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2036-86-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2036-90-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2036-92-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2036-94-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2036-88-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2036-84-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2036-96-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2036-97-0x00000000009E0000-0x00000000009EB000-memory.dmp

    Filesize

    44KB

  • memory/2036-99-0x00000000009E0000-0x00000000009EB000-memory.dmp

    Filesize

    44KB

  • memory/2036-98-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB