Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 20:56

General

  • Target

    323b2b13c65896214f284f1e1ec802002a5166608f2ec38739d886bf15743c63.exe

  • Size

    1.3MB

  • MD5

    78f322feee6480ba7e7b85824e196a00

  • SHA1

    aa7fd6dbde11e6d3d764d94e5eb9ca1aae5f3a59

  • SHA256

    323b2b13c65896214f284f1e1ec802002a5166608f2ec38739d886bf15743c63

  • SHA512

    e4d2b48aa84d7b04f4ba3d25cfc1a1895db8a05815138be6d3cc16de697179e552618c4ba97ad8e031267db0db12b81bc762a2eaa137537936bb5deb12c5f1a0

  • SSDEEP

    24576:9QtK5MHG+Ro5XDGWV3u+da8bVogqfbB031qEi7Q+G0AQqIZbB8:9QtK5MHG+Ro5XDGLKKfI1ViXNH

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 27 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\323b2b13c65896214f284f1e1ec802002a5166608f2ec38739d886bf15743c63.exe
    "C:\Users\Admin\AppData\Local\Temp\323b2b13c65896214f284f1e1ec802002a5166608f2ec38739d886bf15743c63.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2252-0-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-2-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-3-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-4-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-6-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-5-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-8-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-10-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-12-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-14-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-16-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-18-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-20-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-22-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-24-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-26-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-28-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-30-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-32-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-34-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-36-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-38-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-40-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-42-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-44-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-46-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2252-47-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB