Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    171s
  • max time network
    195s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 18:15

General

  • Target

    bc4b18edbf2b6312980b9d11c28beb597dd92312d41c87962f0c7ee90959e66c.exe

  • Size

    3.9MB

  • MD5

    7364c386aa10d962d29d42c5b3fff486

  • SHA1

    30e5fbefaf34ae5a0737730a53a054dbd83c2795

  • SHA256

    bc4b18edbf2b6312980b9d11c28beb597dd92312d41c87962f0c7ee90959e66c

  • SHA512

    d5d9f1c9bf57174d64d32dcb0247ac8a56253aba06e9a520ae72a7c89cf6feae1ce0bd6184a1c57b34b8ce186276b707d1bc91cd12f583f66711f6f6696f21bb

  • SSDEEP

    98304:uyYWEUAAnYxJHBvt5ZvtNVbrgUAkJwZUzpxF55VK5eY:uhRxJHBvfZvtNNJNJwZUzceY

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc4b18edbf2b6312980b9d11c28beb597dd92312d41c87962f0c7ee90959e66c.exe
    "C:\Users\Admin\AppData\Local\Temp\bc4b18edbf2b6312980b9d11c28beb597dd92312d41c87962f0c7ee90959e66c.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:4112

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4112-0-0x0000000000400000-0x0000000000E31000-memory.dmp

    Filesize

    10.2MB

  • memory/4112-1-0x0000000000FF0000-0x0000000000FF1000-memory.dmp

    Filesize

    4KB

  • memory/4112-2-0x0000000000400000-0x0000000000E31000-memory.dmp

    Filesize

    10.2MB

  • memory/4112-3-0x0000000000400000-0x0000000000E31000-memory.dmp

    Filesize

    10.2MB

  • memory/4112-4-0x0000000010000000-0x0000000010116000-memory.dmp

    Filesize

    1.1MB

  • memory/4112-8-0x0000000006100000-0x0000000006159000-memory.dmp

    Filesize

    356KB

  • memory/4112-9-0x0000000077A90000-0x0000000077C30000-memory.dmp

    Filesize

    1.6MB

  • memory/4112-19-0x0000000000400000-0x0000000000E31000-memory.dmp

    Filesize

    10.2MB

  • memory/4112-20-0x0000000000FF0000-0x0000000000FF1000-memory.dmp

    Filesize

    4KB

  • memory/4112-21-0x0000000077A90000-0x0000000077C30000-memory.dmp

    Filesize

    1.6MB

  • memory/4112-23-0x000000000C050000-0x000000000C090000-memory.dmp

    Filesize

    256KB

  • memory/4112-24-0x000000000C050000-0x000000000C090000-memory.dmp

    Filesize

    256KB

  • memory/4112-25-0x000000000C050000-0x000000000C090000-memory.dmp

    Filesize

    256KB

  • memory/4112-26-0x000000000C060000-0x000000000C061000-memory.dmp

    Filesize

    4KB

  • memory/4112-27-0x000000000C060000-0x000000000C061000-memory.dmp

    Filesize

    4KB

  • memory/4112-28-0x000000000C050000-0x000000000C090000-memory.dmp

    Filesize

    256KB

  • memory/4112-29-0x000000000C050000-0x000000000C090000-memory.dmp

    Filesize

    256KB

  • memory/4112-30-0x000000000C050000-0x000000000C090000-memory.dmp

    Filesize

    256KB

  • memory/4112-32-0x000000000C060000-0x000000000C061000-memory.dmp

    Filesize

    4KB

  • memory/4112-31-0x000000000C060000-0x000000000C061000-memory.dmp

    Filesize

    4KB

  • memory/4112-33-0x000000000C060000-0x000000000C061000-memory.dmp

    Filesize

    4KB