Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2023, 12:51

General

  • Target

    89ac3e47bab410f8a9d7cf2ac1d992a7676ff555fa208c38b2ab997386569e1c.exe

  • Size

    9.4MB

  • MD5

    5e3d56bca2a37b5781f75cdf86a3b0cb

  • SHA1

    b07c41391ebd8da028cba1be78c78b0f93bcf092

  • SHA256

    89ac3e47bab410f8a9d7cf2ac1d992a7676ff555fa208c38b2ab997386569e1c

  • SHA512

    c9a432bbae8da4fad1ce2239145777afef5e60d8c2a2b4ee544c9db661a5fe890d340440064840c90f362dab0cc804cf4df2481a210811117364fff2a2a09297

  • SSDEEP

    196608:pS7mQRwHNLJuAdooVj4ImBELJsQdmjsCROjK/sf8wryRvJHOvlWk+Z1O:JZVL4CddvjK/MGvBSlWlO

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • VMProtect packed file 6 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89ac3e47bab410f8a9d7cf2ac1d992a7676ff555fa208c38b2ab997386569e1c.exe
    "C:\Users\Admin\AppData\Local\Temp\89ac3e47bab410f8a9d7cf2ac1d992a7676ff555fa208c38b2ab997386569e1c.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3736
    • C:\Users\Admin\AppData\Local\Temp\89ac3e47bab410f8a9d7cf2ac1d992a7676ff555fa208c38b2ab997386569e1c.exe
      C:\Users\Admin\AppData\Local\Temp\89ac3e47bab410f8a9d7cf2ac1d992a7676ff555fa208c38b2ab997386569e1c.exe
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2664

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ExuiKrnln_Win32.lib

    Filesize

    1.6MB

    MD5

    031ad1ecd93701d39265771942ec716c

    SHA1

    cb3ef507bf0e848894fbb96a29bfc94a0c302152

    SHA256

    9a7fde2ea7883701bf858e0daef74d787a31c3cbd9f1171cec0a3a382ee9e6ba

    SHA512

    374dab32b6304834c7acd8b5e6701ece016bf57d3abdd416ef2b63f7cbda24c9e59f9dfc27b6823ac6256bbab38aace74334dec7d57f1ef6cb9b80c239003bae

  • C:\Users\Admin\AppData\Local\Temp\ExuiKrnln_Win32.lib

    Filesize

    1.6MB

    MD5

    031ad1ecd93701d39265771942ec716c

    SHA1

    cb3ef507bf0e848894fbb96a29bfc94a0c302152

    SHA256

    9a7fde2ea7883701bf858e0daef74d787a31c3cbd9f1171cec0a3a382ee9e6ba

    SHA512

    374dab32b6304834c7acd8b5e6701ece016bf57d3abdd416ef2b63f7cbda24c9e59f9dfc27b6823ac6256bbab38aace74334dec7d57f1ef6cb9b80c239003bae

  • memory/2664-20-0x00000000022F0000-0x00000000022F1000-memory.dmp

    Filesize

    4KB

  • memory/2664-18-0x00000000020D0000-0x00000000020D1000-memory.dmp

    Filesize

    4KB

  • memory/2664-30-0x0000000000400000-0x0000000001DFF000-memory.dmp

    Filesize

    26.0MB

  • memory/2664-29-0x0000000000400000-0x0000000001DFF000-memory.dmp

    Filesize

    26.0MB

  • memory/2664-21-0x0000000000400000-0x0000000001DFF000-memory.dmp

    Filesize

    26.0MB

  • memory/2664-23-0x0000000002300000-0x0000000002301000-memory.dmp

    Filesize

    4KB

  • memory/2664-19-0x00000000020E0000-0x00000000020E1000-memory.dmp

    Filesize

    4KB

  • memory/2664-17-0x00000000020A0000-0x00000000020A1000-memory.dmp

    Filesize

    4KB

  • memory/2664-16-0x0000000002090000-0x0000000002091000-memory.dmp

    Filesize

    4KB

  • memory/2664-15-0x0000000001F20000-0x0000000001F21000-memory.dmp

    Filesize

    4KB

  • memory/3736-7-0x0000000002440000-0x0000000002441000-memory.dmp

    Filesize

    4KB

  • memory/3736-14-0x0000000000400000-0x0000000001DFF000-memory.dmp

    Filesize

    26.0MB

  • memory/3736-11-0x0000000000400000-0x0000000001DFF000-memory.dmp

    Filesize

    26.0MB

  • memory/3736-1-0x0000000000400000-0x0000000001DFF000-memory.dmp

    Filesize

    26.0MB

  • memory/3736-3-0x00000000023E0000-0x00000000023E1000-memory.dmp

    Filesize

    4KB

  • memory/3736-6-0x0000000002430000-0x0000000002431000-memory.dmp

    Filesize

    4KB

  • memory/3736-2-0x0000000001FD0000-0x0000000001FD1000-memory.dmp

    Filesize

    4KB

  • memory/3736-0-0x0000000001FB0000-0x0000000001FB1000-memory.dmp

    Filesize

    4KB

  • memory/3736-5-0x0000000002420000-0x0000000002421000-memory.dmp

    Filesize

    4KB

  • memory/3736-4-0x0000000002410000-0x0000000002411000-memory.dmp

    Filesize

    4KB