Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    131s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    31/10/2023, 14:36

General

  • Target

    8e336cc13c81143b7f6bc68dfcfc1499430a05ec15f0304020ffb7a8e3ad4fb0.exe

  • Size

    2.9MB

  • MD5

    b973917b15a5006ad7e4159c42d243e5

  • SHA1

    e8cdba7dc1acc0873e643f56c7924892694a9971

  • SHA256

    8e336cc13c81143b7f6bc68dfcfc1499430a05ec15f0304020ffb7a8e3ad4fb0

  • SHA512

    205a45ebb8d2a2ded576d0827573b28f007cbe32ffda4410f62e9e9fedf4e455ae48168524b46a1d2e26260b3f11c5c1c1724e3267bb53dcf0b7f400bfa89fc8

  • SSDEEP

    24576:+mratJsrhFm2Z5p1fH1FFAEvjWmQohdgJTrPNvvUFiS8r1UmAsHPJ5e1oT8MkP7z:nEk9hyJTDN75Om8ME5PeAPWJRlGUJ9r

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e336cc13c81143b7f6bc68dfcfc1499430a05ec15f0304020ffb7a8e3ad4fb0.exe
    "C:\Users\Admin\AppData\Local\Temp\8e336cc13c81143b7f6bc68dfcfc1499430a05ec15f0304020ffb7a8e3ad4fb0.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2820

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2820-0-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2820-1-0x0000000003F30000-0x0000000003F31000-memory.dmp

    Filesize

    4KB

  • memory/2820-2-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2820-3-0x0000000000400000-0x000000000220B000-memory.dmp

    Filesize

    30.0MB

  • memory/2820-4-0x0000000003F30000-0x0000000003F31000-memory.dmp

    Filesize

    4KB

  • memory/2820-5-0x0000000000400000-0x000000000220B000-memory.dmp

    Filesize

    30.0MB

  • memory/2820-6-0x0000000000400000-0x000000000220B000-memory.dmp

    Filesize

    30.0MB

  • memory/2820-7-0x0000000000400000-0x000000000220B000-memory.dmp

    Filesize

    30.0MB

  • memory/2820-8-0x0000000000400000-0x000000000220B000-memory.dmp

    Filesize

    30.0MB

  • memory/2820-9-0x0000000000400000-0x000000000220B000-memory.dmp

    Filesize

    30.0MB

  • memory/2820-10-0x0000000000400000-0x000000000220B000-memory.dmp

    Filesize

    30.0MB

  • memory/2820-11-0x0000000000400000-0x000000000220B000-memory.dmp

    Filesize

    30.0MB

  • memory/2820-12-0x0000000000400000-0x000000000220B000-memory.dmp

    Filesize

    30.0MB

  • memory/2820-13-0x0000000000400000-0x000000000220B000-memory.dmp

    Filesize

    30.0MB

  • memory/2820-14-0x0000000000400000-0x000000000220B000-memory.dmp

    Filesize

    30.0MB

  • memory/2820-15-0x0000000000400000-0x000000000220B000-memory.dmp

    Filesize

    30.0MB

  • memory/2820-16-0x0000000000400000-0x000000000220B000-memory.dmp

    Filesize

    30.0MB