Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/11/2023, 15:06

General

  • Target

    d74833e5d2a9f2d4486e4b0307a89930a0072a74211dc1666af06cb7ad0fdd9e.exe

  • Size

    4.7MB

  • MD5

    054e3dea1bb02388baecdd4e52883857

  • SHA1

    79a10aa8289eb641bcb156af575a815a28821fc0

  • SHA256

    d74833e5d2a9f2d4486e4b0307a89930a0072a74211dc1666af06cb7ad0fdd9e

  • SHA512

    49e3d4a254bf67140c0b254cb8180d8ce975ac48cc98d90c0ab3a34c4687ff67775580d6910e53a98c93bb992669fc19faaf05e451625f813844a45b6c65ee2c

  • SSDEEP

    49152:xb2XfWHdZ8BhE7K2dM3Jqfmc2jRAjY+r5u8QeKxFOJxdb4vZKVI:12XeHdZChmK2d7eRR+KdzOJDb4v+I

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d74833e5d2a9f2d4486e4b0307a89930a0072a74211dc1666af06cb7ad0fdd9e.exe
    "C:\Users\Admin\AppData\Local\Temp\d74833e5d2a9f2d4486e4b0307a89930a0072a74211dc1666af06cb7ad0fdd9e.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4404

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    3KB

    MD5

    68cf64305bcbd85f94bc453a11e6bdf5

    SHA1

    b8ff69c7301c6e63475d64d54463d959ab99ca42

    SHA256

    c4030b01df2399b7070dd6e50ed577d3ee3f5ab436b9de077fa1878df67a4bdd

    SHA512

    5615542acecf2b739a2aa60f6c1077f03ea577b7bbcda9bc7e8b93a2115c170f5028284b10af718b0be59f7654b74809d1753ec96f0b2f65fd4e1adba6c0fea6

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    7KB

    MD5

    a0fb9886eb45b6dfbd086d4399c4721b

    SHA1

    35782a32e60ebd5d4f63f462201d71b4209f9bb3

    SHA256

    c8b47f6f6ca4a4a4cd6a7cfffc851b0f3915d1e730ef2421b972fe3f18b14834

    SHA512

    834b900214e56d5a83fbe3b527766046b90a43b63bfdfc404b633fd7a12baf1f6ef19ce3a360391696d208ffeee6a87210d955db965bc256cf4bb0efd096b89e

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    3224f8523ab5b68b35dad552a207c2b5

    SHA1

    9e25cbb0ce3474d75d12fa7bf034345d2e545e61

    SHA256

    f87617d989614f504c22ec42e56b1d74574dc5960ce447d9659682146e042af3

    SHA512

    b61790cb46e39631a11a37e33db8c8d692b8853d59299b2134fca78a189208689df30449091febd1bbddbe514ce4067efcdbe7ca4b2fad987858a212b74ace46