Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    202s
  • max time network
    216s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2023, 11:58

General

  • Target

    bd4154ea08667f250e0233a666d4d502a386a65dcd1dd10758979e6ddb4b1053.exe

  • Size

    4.1MB

  • MD5

    62d9e4b1bbfc57b8b15397ac431c79ab

  • SHA1

    6fa148d8df04ff6380440587159101a69f903227

  • SHA256

    bd4154ea08667f250e0233a666d4d502a386a65dcd1dd10758979e6ddb4b1053

  • SHA512

    c8fe6f4ce475aaa93a12a9d9987931b4f6a9d50df558dc513faf044a4b7c619ae1d454470d90bb0313f2c9064d51c6b36b6277666d07899180c8d6d2e6cdf583

  • SSDEEP

    49152:fDnaVVMzMvkMUzM3n5x/+J+OeRY+r5u8QeKxFOJxdb4vZKV:LaVizMvkMUg3n5xXKdzOJDb4v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd4154ea08667f250e0233a666d4d502a386a65dcd1dd10758979e6ddb4b1053.exe
    "C:\Users\Admin\AppData\Local\Temp\bd4154ea08667f250e0233a666d4d502a386a65dcd1dd10758979e6ddb4b1053.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2452

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    1KB

    MD5

    aa64db24cc5f9e840dba9e20ca49824d

    SHA1

    57f67c3fda99c9d0b91631c63a6ed826b764f7de

    SHA256

    7fd00622cc12f769f7d5815ecae2f1bc0254b1d837a98801e3869e0fef857895

    SHA512

    b6654c6b7426db37dfa983bf2a9c042e32e4286a48065490a6391c7723709a72d24da9968fdc3e9d940d47ac547e3e1296eb877766271c54d7fba7fd7c6888ab

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    5KB

    MD5

    e91343eeb1eade272215d241deb9df11

    SHA1

    44db8bef10c86d39eda53ddba379f7f3bfb10a63

    SHA256

    79e35b875b6d311785bb38115e1fb73c359ed724f60d159d2b111fd194d46300

    SHA512

    adb997be2e15a8d8b509efc2cb9ebe4de74e353ce50b195d9646eaa8d663ca02a1ea1b732a04cb9548c67476cfe26bdc8c397a2d5213eb025c5f8ebe0644c397

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    7661bac1d414b6512e99615024c4444d

    SHA1

    688994dcb77896ff91f243d354d0b0d983ba43e4

    SHA256

    237c467c7252eaeff7e2588975ba9503a60f6cb6636a65cdaeed645d88188352

    SHA512

    5ab0f6bf1c87b90b28c4c9d0c1b1822ca14e06b7bfd4e77038cb60bc5866b3180dac0962d3a095ac27abfb9180369fa163b8736c1f7e94cd9b430a046bad387e