Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2023, 21:13

General

  • Target

    96d8cbc79f3be5d70af8cb20c8b2349bbde28399cda4ae372f0157be3bb18129.exe

  • Size

    2.3MB

  • MD5

    e938935db1909a33473aad99b2c3b685

  • SHA1

    a98ff67336da2f38676d18243c6a9be2758518b7

  • SHA256

    96d8cbc79f3be5d70af8cb20c8b2349bbde28399cda4ae372f0157be3bb18129

  • SHA512

    787b079585859efbf3452e50f31b79cb87ea7869b7862aad672cde9f0ee1f983d3bc284b28c56819653eeee32c587c88eeea59b446f835ce9c69494f54ad36d6

  • SSDEEP

    24576:Es8jONh5DQwsJAyLVn3eody1VEYYUba3PwhQtLOEDbF4:NdEJt3eQwWYYUu3PaMxF4

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\96d8cbc79f3be5d70af8cb20c8b2349bbde28399cda4ae372f0157be3bb18129.exe
    "C:\Users\Admin\AppData\Local\Temp\96d8cbc79f3be5d70af8cb20c8b2349bbde28399cda4ae372f0157be3bb18129.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2516

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2516-55-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2516-53-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2516-58-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2516-56-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2516-60-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2516-62-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2516-64-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2516-66-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2516-70-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2516-68-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2516-76-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2516-74-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2516-72-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2516-78-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2516-80-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2516-84-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2516-87-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2516-82-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2516-89-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2516-92-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2516-98-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2516-96-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2516-94-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2516-99-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB