Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/10/2023, 14:18

General

  • Target

    365e75fab984adf085f70be41d98f76f2fbb1ea41327100e3449c2ffd4229cef.exe

  • Size

    1.8MB

  • MD5

    2b6d1bad2c04c4883d7429a197e67666

  • SHA1

    817c80631bf584bb18a63d45a24f26cea3ad11ad

  • SHA256

    365e75fab984adf085f70be41d98f76f2fbb1ea41327100e3449c2ffd4229cef

  • SHA512

    449f087e93609a30d6d45bee35962e23013e8d769f5419a31ee14be1e757bf97924376d36de0d9a4506f07df6adb9e07e79bcf7e95938bb478d30afdc55362e7

  • SSDEEP

    49152:Jxq1vu5zkd1XqmwUdiviDGAHwzWwWGODtY:Jxq6k6vfWfZ2

Score
7/10

Malware Config

Signatures

  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\365e75fab984adf085f70be41d98f76f2fbb1ea41327100e3449c2ffd4229cef.exe
    "C:\Users\Admin\AppData\Local\Temp\365e75fab984adf085f70be41d98f76f2fbb1ea41327100e3449c2ffd4229cef.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetWindowsHookEx
    PID:3892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\365e75fab984adf085f70be41d98f76f2fbb1ea41327100e3449c2ffd4229cef.log

    Filesize

    116B

    MD5

    42c2e665482be7d7b52f08d066db0b76

    SHA1

    85a93dd6c44efe6d608009f48b86b8cd5cc47292

    SHA256

    d4f9e082284afdd5169e77fe2809ea468b99031b12b0a785db167162868efb45

    SHA512

    320c88fcf2dde78dadc66c7c67ff7914f5cb6d67e0abea3d830a9561112018e7a2d0c3005fa9e75e92c2863e63765dc26bbe7a310f8d82611a8bd55892a54a78

  • C:\Users\Admin\AppData\Local\Temp\365e75fab984adf085f70be41d98f76f2fbb1ea41327100e3449c2ffd4229cef.log

    Filesize

    2KB

    MD5

    a6e65365355b8eab6358958c3948e9e7

    SHA1

    64f5dc2c2ef2478c58a4762be44ef0019dbb7a52

    SHA256

    85a80fababf46d6792dabb82afc6db6099d1346b7ba75fa9f86471381360c451

    SHA512

    f44b8044c277ed183b2a2818e42be205c8f50d775db1424874384d6e9ca5ce28ea0b1356b658ac3e942ec09327685e03be059566eb1c6e814265a900a2997d26

  • C:\Users\Admin\AppData\Local\Temp\365e75fab984adf085f70be41d98f76f2fbb1ea41327100e3449c2ffd4229cef.log

    Filesize

    4KB

    MD5

    2bb10666a5b3b7f3d2dc87f7c7682179

    SHA1

    f4479c0c0fd3f9afbf741589e0e5edad26563bb2

    SHA256

    038f666127a52e46094f5b7c9090e21d8f6443d04af59d15aebefab58872dc24

    SHA512

    f2e62a2c0732ecf192e4f156d9b2c250c3069dddb3bc4ab9e64b65900dfcbe2c4ef2538b9708d41f1b843824a6d165f16a4c8ffecc6322a6e5427fd2dab0ac11

  • memory/3892-16-0x0000000000400000-0x0000000000B37000-memory.dmp

    Filesize

    7.2MB

  • memory/3892-91-0x0000000000400000-0x0000000000B37000-memory.dmp

    Filesize

    7.2MB

  • memory/3892-17-0x0000000002A30000-0x0000000002A31000-memory.dmp

    Filesize

    4KB

  • memory/3892-26-0x0000000000400000-0x0000000000B37000-memory.dmp

    Filesize

    7.2MB

  • memory/3892-39-0x0000000000400000-0x0000000000B37000-memory.dmp

    Filesize

    7.2MB

  • memory/3892-15-0x0000000000400000-0x0000000000B37000-memory.dmp

    Filesize

    7.2MB

  • memory/3892-74-0x0000000000400000-0x0000000000B37000-memory.dmp

    Filesize

    7.2MB

  • memory/3892-0-0x0000000000400000-0x0000000000B37000-memory.dmp

    Filesize

    7.2MB

  • memory/3892-1-0x0000000002A30000-0x0000000002A31000-memory.dmp

    Filesize

    4KB

  • memory/3892-112-0x0000000000400000-0x0000000000B37000-memory.dmp

    Filesize

    7.2MB

  • memory/3892-133-0x0000000000400000-0x0000000000B37000-memory.dmp

    Filesize

    7.2MB

  • memory/3892-150-0x0000000000400000-0x0000000000B37000-memory.dmp

    Filesize

    7.2MB

  • memory/3892-171-0x0000000000400000-0x0000000000B37000-memory.dmp

    Filesize

    7.2MB

  • memory/3892-192-0x0000000000400000-0x0000000000B37000-memory.dmp

    Filesize

    7.2MB

  • memory/3892-209-0x0000000000400000-0x0000000000B37000-memory.dmp

    Filesize

    7.2MB

  • memory/3892-230-0x0000000000400000-0x0000000000B37000-memory.dmp

    Filesize

    7.2MB