Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 22:33

General

  • Target

    1604a7516dad202b4a5e4188662f0b89.exe

  • Size

    40KB

  • MD5

    1604a7516dad202b4a5e4188662f0b89

  • SHA1

    360b1c0272ee64249b034df274e76786d93de69a

  • SHA256

    7fdf162ee11e800260cccce05342f2a9f075c7ddd800d955c03ef6d914fa648a

  • SHA512

    7d4c70ad9bd5bd702dcfb482263ff806ac6a2fe4870b36e153a3d9b5f050a28427c1438b4ebac4c7354ae621ca2e7ea38fd11e4ff354a9e027569fc99e5232ed

  • SSDEEP

    768:iwpcf/KvSCgaZZLoKV/ZqtxrWWZkN4bGf4gK3p4Heb6W8jU5Cvx7VAUaIiQZzcJk:iwpcf/KvSVajV/ZqtxrWWZFvgK0XW2MC

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1604a7516dad202b4a5e4188662f0b89.exe
    "C:\Users\Admin\AppData\Local\Temp\1604a7516dad202b4a5e4188662f0b89.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetWindowsHookEx
    PID:4720
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 932
      2⤵
      • Program crash
      PID:3304
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4720 -ip 4720
    1⤵
      PID:5024

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4720-0-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/4720-1-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/4720-3-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/4720-2-0x0000000002130000-0x0000000002131000-memory.dmp

      Filesize

      4KB

    • memory/4720-4-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/4720-6-0x0000000002130000-0x0000000002131000-memory.dmp

      Filesize

      4KB

    • memory/4720-22-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB