Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07/10/2023, 18:27

General

  • Target

    35ebfba16207b69d197f739bab792d86c40ad1ebc3dd7478c84deae87ed7d814.exe

  • Size

    5.6MB

  • MD5

    569e1206f7297afb742f46bdf31fee02

  • SHA1

    b1c9380326197113a8b97859756d37fca1ac8b62

  • SHA256

    35ebfba16207b69d197f739bab792d86c40ad1ebc3dd7478c84deae87ed7d814

  • SHA512

    87c40a4a5a28b1ef5c8e9233c311f107ecea62cf0956c698734e9a275cae91e32b87e89edffd7c123575203dff9da1d855707e3dd8a34f7a1002b3019267a725

  • SSDEEP

    98304:2BtaRDu2xK7yzs3fOVhZJjXofZW1cYtSd9Si1G+1XNM2MCDTOf5xNqY:2PaRDu2grOtJjX4ocr9VPPD0x

Score
7/10

Malware Config

Signatures

  • VMProtect packed file 5 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35ebfba16207b69d197f739bab792d86c40ad1ebc3dd7478c84deae87ed7d814.exe
    "C:\Users\Admin\AppData\Local\Temp\35ebfba16207b69d197f739bab792d86c40ad1ebc3dd7478c84deae87ed7d814.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2992

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2992-0-0x0000000000400000-0x0000000001F20000-memory.dmp

    Filesize

    27.1MB

  • memory/2992-1-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2992-3-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2992-5-0x0000000000400000-0x0000000001F20000-memory.dmp

    Filesize

    27.1MB

  • memory/2992-6-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2992-7-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/2992-9-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/2992-11-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/2992-14-0x00000000020B0000-0x00000000020B1000-memory.dmp

    Filesize

    4KB

  • memory/2992-16-0x00000000020B0000-0x00000000020B1000-memory.dmp

    Filesize

    4KB

  • memory/2992-19-0x00000000020C0000-0x00000000020C1000-memory.dmp

    Filesize

    4KB

  • memory/2992-21-0x00000000020C0000-0x00000000020C1000-memory.dmp

    Filesize

    4KB

  • memory/2992-24-0x00000000020D0000-0x00000000020D1000-memory.dmp

    Filesize

    4KB

  • memory/2992-26-0x00000000020D0000-0x00000000020D1000-memory.dmp

    Filesize

    4KB

  • memory/2992-29-0x00000000020E0000-0x00000000020E1000-memory.dmp

    Filesize

    4KB

  • memory/2992-31-0x00000000020E0000-0x00000000020E1000-memory.dmp

    Filesize

    4KB

  • memory/2992-32-0x0000000002170000-0x0000000002171000-memory.dmp

    Filesize

    4KB

  • memory/2992-34-0x0000000002170000-0x0000000002171000-memory.dmp

    Filesize

    4KB

  • memory/2992-36-0x0000000002170000-0x0000000002171000-memory.dmp

    Filesize

    4KB

  • memory/2992-37-0x00000000771D0000-0x00000000771D1000-memory.dmp

    Filesize

    4KB

  • memory/2992-42-0x0000000000400000-0x0000000001F20000-memory.dmp

    Filesize

    27.1MB

  • memory/2992-43-0x0000000000400000-0x0000000001F20000-memory.dmp

    Filesize

    27.1MB

  • memory/2992-44-0x0000000000400000-0x0000000001F20000-memory.dmp

    Filesize

    27.1MB