Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/10/2023, 12:21

General

  • Target

    2c1fcc7f2d9e9fa0705060946d5c1eb924d36f4bf0387c2471a897c57cac99c8.exe

  • Size

    409KB

  • MD5

    d2573dba2ff6086dc69349aab360cd3b

  • SHA1

    9df9e33ed4c5391129f37eefde4aff9debfb5a2e

  • SHA256

    2c1fcc7f2d9e9fa0705060946d5c1eb924d36f4bf0387c2471a897c57cac99c8

  • SHA512

    4fe52542c1d523e01f78857594c95bf4cfa40f46b9ed61a462117ac778d0bd6fc4e6e3b95a344eca6624d3ee1b2fbc8c330c695f2d6c5def5f7b8bcbaad2db0b

  • SSDEEP

    12288:gWxykPY5uEafLJyea8C+CsWWzo2qxI069C3qG7jqURFd:g355a1ta8ksrqC0X3qGPFd

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c1fcc7f2d9e9fa0705060946d5c1eb924d36f4bf0387c2471a897c57cac99c8.exe
    "C:\Users\Admin\AppData\Local\Temp\2c1fcc7f2d9e9fa0705060946d5c1eb924d36f4bf0387c2471a897c57cac99c8.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4856

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7H3JZN74\ptqrlogin[1].js

    Filesize

    62B

    MD5

    35d6ed964e36afae181a94c1b38ecbd1

    SHA1

    d10bcaef1136f3934dd4162950b830d6da141ddb

    SHA256

    f098589339025fe249427c47708b19549f9f29367edae71365421f6b6ca4d90a

    SHA512

    ad92e02fafef1923d23903cb69b54504cc421f7f0a8813f61c94caf3883d8a9c92c3f1a8082d50535fa2a12290ffcdbd173bcb538b8126453e7f40b44a4f22ce

  • memory/4856-34-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/4856-57-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/4856-4-0x0000000002560000-0x00000000025AB000-memory.dmp

    Filesize

    300KB

  • memory/4856-5-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/4856-20-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/4856-1-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/4856-27-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/4856-0-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/4856-2-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/4856-43-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/4856-50-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/4856-66-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/4856-73-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/4856-80-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/4856-87-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/4856-96-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/4856-103-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/4856-112-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB