Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    06/07/2023, 11:31

General

  • Target

    373b657c3268a4529d6c5c370e2a709d8ee65a38fef1cc34e8e5ca36964186c8.exe

  • Size

    614KB

  • MD5

    a186fb3d91aed0ae208f7b4187e5eafe

  • SHA1

    afe955622fb3620f892179a51153bcd2cc239c05

  • SHA256

    373b657c3268a4529d6c5c370e2a709d8ee65a38fef1cc34e8e5ca36964186c8

  • SHA512

    ba4f1dec2609e5bb23f4268fc35cd428905e64cf05e24fd42f81516e6fa29051ec364b6190584f79891d615208f5710832ecacb8e03a93f42551b82c8ac65474

  • SSDEEP

    12288:6NPyeIYkEKsH8IB2GusNcsrkVuHaeq6ILuPsBjh:6N6tYkwH8IB2GuXRFNLuQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\373b657c3268a4529d6c5c370e2a709d8ee65a38fef1cc34e8e5ca36964186c8.exe
    "C:\Users\Admin\AppData\Local\Temp\373b657c3268a4529d6c5c370e2a709d8ee65a38fef1cc34e8e5ca36964186c8.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2172

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2172-54-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2172-61-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2172-75-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2172-76-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2172-77-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2172-78-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2172-79-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2172-80-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2172-81-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2172-82-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2172-83-0x0000000003130000-0x0000000003131000-memory.dmp

    Filesize

    4KB

  • memory/2172-84-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2172-85-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2172-86-0x0000000003130000-0x0000000003131000-memory.dmp

    Filesize

    4KB

  • memory/2172-87-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2172-88-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2172-89-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2172-90-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2172-91-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB