Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/11/2023, 14:45

General

  • Target

    484176c4413639f2e0a3af0466b30ce68d0e9af05972af6d5824253b37a5d6ed.exe

  • Size

    4.2MB

  • MD5

    c4eb1d04e1f8ccb8dcf4781f5956c39d

  • SHA1

    f75528d41e9adebd9a56376a6fa0ffa5bed399a6

  • SHA256

    484176c4413639f2e0a3af0466b30ce68d0e9af05972af6d5824253b37a5d6ed

  • SHA512

    d6130ec00bf612fba5910bfd5fbff31a8dae0f2e0b5d6e7329a5df799122a6664e2bd9bee71b3ac361a3f3c831cd1ac8207907ac5052b78fa7e5f8a0f5742793

  • SSDEEP

    98304:g+O2cuzBDfuN02v4b53Qk1rt22J70dDruvurOaAI8mVFxQGr:gZWBD7pb53Qk1JDkvLrZAI8mVFxQI

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\484176c4413639f2e0a3af0466b30ce68d0e9af05972af6d5824253b37a5d6ed.exe
    "C:\Users\Admin\AppData\Local\Temp\484176c4413639f2e0a3af0466b30ce68d0e9af05972af6d5824253b37a5d6ed.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:4980

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4980-0-0x0000000000400000-0x0000000000ECB000-memory.dmp

    Filesize

    10.8MB

  • memory/4980-1-0x0000000001140000-0x0000000001141000-memory.dmp

    Filesize

    4KB

  • memory/4980-2-0x0000000000400000-0x0000000000ECB000-memory.dmp

    Filesize

    10.8MB

  • memory/4980-3-0x0000000000400000-0x0000000000ECB000-memory.dmp

    Filesize

    10.8MB

  • memory/4980-4-0x0000000010000000-0x0000000010116000-memory.dmp

    Filesize

    1.1MB

  • memory/4980-8-0x00000000061A0000-0x00000000061F9000-memory.dmp

    Filesize

    356KB

  • memory/4980-9-0x0000000076890000-0x0000000076A30000-memory.dmp

    Filesize

    1.6MB

  • memory/4980-20-0x000000000C0E0000-0x000000000C120000-memory.dmp

    Filesize

    256KB

  • memory/4980-21-0x000000000C0E0000-0x000000000C120000-memory.dmp

    Filesize

    256KB

  • memory/4980-22-0x000000000C0E0000-0x000000000C120000-memory.dmp

    Filesize

    256KB

  • memory/4980-23-0x000000000C0E0000-0x000000000C120000-memory.dmp

    Filesize

    256KB

  • memory/4980-24-0x000000000C0E0000-0x000000000C120000-memory.dmp

    Filesize

    256KB

  • memory/4980-25-0x0000000000400000-0x0000000000ECB000-memory.dmp

    Filesize

    10.8MB

  • memory/4980-26-0x0000000001140000-0x0000000001141000-memory.dmp

    Filesize

    4KB

  • memory/4980-27-0x0000000076890000-0x0000000076A30000-memory.dmp

    Filesize

    1.6MB

  • memory/4980-28-0x000000000C0E0000-0x000000000C120000-memory.dmp

    Filesize

    256KB

  • memory/4980-29-0x000000000C0E0000-0x000000000C120000-memory.dmp

    Filesize

    256KB

  • memory/4980-30-0x000000000C0E0000-0x000000000C120000-memory.dmp

    Filesize

    256KB

  • memory/4980-31-0x000000000C0E0000-0x000000000C120000-memory.dmp

    Filesize

    256KB

  • memory/4980-32-0x000000000C0E0000-0x000000000C120000-memory.dmp

    Filesize

    256KB

  • memory/4980-33-0x000000000C0E0000-0x000000000C120000-memory.dmp

    Filesize

    256KB