Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 04:23

General

  • Target

    6334ebbe714e4046930889e01184ed7f.exe

  • Size

    462KB

  • MD5

    6334ebbe714e4046930889e01184ed7f

  • SHA1

    aa31929af08603d9803181deddb42dd6c552d794

  • SHA256

    17b8efa3de8d805a2b067ffcf9ad9520a43d4e24823f063f1965871ef1066430

  • SHA512

    b190fead5e01c0ea39b5134b3044f6dd1c98b8f932480b4fea22f2f15e7881a7e2aa61bc4875dae7ba2c2663f33542f12a95183cad445db71b80abb767b5c4e9

  • SSDEEP

    6144:DpesgEdsW4K6o6ccT0ta+QNIIXK0b/VffQDabqlMGK:d8KB60tabDbGMGK

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6334ebbe714e4046930889e01184ed7f.exe
    "C:\Users\Admin\AppData\Local\Temp\6334ebbe714e4046930889e01184ed7f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Users\Admin\AppData\Local\Temp\6334ebbe714e4046930889e01184ed7f.xgd
      C:\Users\Admin\AppData\Local\Temp\6334ebbe714e4046930889e01184ed7f.xgd
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1968

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\6334ebbe714e4046930889e01184ed7f.xgd

    Filesize

    6KB

    MD5

    fab616e5e504c389fcc6434f1d20beb5

    SHA1

    87c0e49037187c43159a09ce12a3329c1bab3660

    SHA256

    08b65738b67eef01ef49cd98feeb31af24cfc6fa5dc89aa2e908d79f0a34ce8c

    SHA512

    a741585d24d125f18aace9fc2e7a3fc324369de6c03f2c5d14b7f694cf650b211eca2c0270b419654dc75d18be354761292cc5e95a83baf568c5ee8043c3d018

  • memory/1968-7-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1968-10-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1968-11-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB