Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    167s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2023, 10:21

General

  • Target

    2f31f9b6168f94df56619ca1141ffe5faf0df4af4b16439a1b3d1092dc4480d0.exe

  • Size

    4.7MB

  • MD5

    f80d645e6d71efb780d81263f2f4fdaf

  • SHA1

    7f8aeed557b2ed0e21c1697bcb8a712476cbbb67

  • SHA256

    2f31f9b6168f94df56619ca1141ffe5faf0df4af4b16439a1b3d1092dc4480d0

  • SHA512

    4fd3e9f4e39d6e978e20208f7ae2771fab41f78f68c3064002656cbf70279120559c757311546c691abbb0a954c665622050bacf31a505f5e19f8b4809c7505f

  • SSDEEP

    49152:ymTMlGjQOsSzd3R8bj1LOhtR+RV3BwvPpicjTup0fY+r5u8QeKxFOJxdb4vZKVC:3TKOZx36bjNOhquPk0TFKdzOJDb4v+C

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f31f9b6168f94df56619ca1141ffe5faf0df4af4b16439a1b3d1092dc4480d0.exe
    "C:\Users\Admin\AppData\Local\Temp\2f31f9b6168f94df56619ca1141ffe5faf0df4af4b16439a1b3d1092dc4480d0.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1356

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    1KB

    MD5

    01108af8bc2c5d5a6bace943e4349609

    SHA1

    b6ab1f574cfe141fe57180fdd5a20e66f87bf973

    SHA256

    6681e6c51028fe6edbf4995d59ea12cdde349214f61081aac1257b9c8d41f466

    SHA512

    ccd66676b1dd682466b060f8f59444bec347dcf4d9f51f96ff83f7e1963a8cd23686f23f62c38a112ea43c052af08f5de85394383a2b4fdc7b7fe666b7a7d7ca

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    5KB

    MD5

    b38d97f22ec39eda7a4b2df6037d63ab

    SHA1

    ad963c18121a3b882bde76400a805d8549156cb2

    SHA256

    877b07934c97990b923d54232fd80aa6ed5916bdfec9bdd669805dfe0a8f62c6

    SHA512

    2b8277cf7a017d820d0c9a48ae4b7c74c5b7db579453413e4e6d896b4e28b29228ee85b9d24041ccd9f7f093ba8dab57fc3f784e91864e70c9f6646d9eb42b1b

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    9ea5da7937403f47610a54c69e420dc5

    SHA1

    ffecc36cf7614d25d7b1e27ccba2ef12cc9ef27f

    SHA256

    fb0296bccbc033db978a5dee1a3a7f603c86ee8c27e9f85dd4d62ffd29973c5d

    SHA512

    d9e220b2c6fe062527f5eed7b7c8e5a8af2e4a78a44168b74459fc612c0690a73f29a908b6d1f8f2861ca464809d2d9fb99b94f5f18f2d7c66e0b9b06ee0a930