Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
99s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 16:10
Static task
static1
Behavioral task
behavioral1
Sample
050b2e51ce97d0cc72c3f3c2d7fbde7a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
050b2e51ce97d0cc72c3f3c2d7fbde7a.exe
Resource
win10v2004-20231215-en
General
-
Target
050b2e51ce97d0cc72c3f3c2d7fbde7a.exe
-
Size
1.1MB
-
MD5
050b2e51ce97d0cc72c3f3c2d7fbde7a
-
SHA1
60144cdcd7afe414c1ede5b96a34895c779ceadc
-
SHA256
240943bb9ab1e932db45765016cba88f1235bc374984653d2ecf7794a8eea34d
-
SHA512
04cd8c5645c298a508d432bcb11cde441c9996d156befef7e3c9a380fdb308e1e3387adec19d56a4de6d67939d378937c64ce2b21ee84e2f8fed91afe2dcad21
-
SSDEEP
24576:ya8GzDN7aZZm8Y59hokodTM5Nl23qec1nTX1W:WG41ko5+l+qeaRW
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000700000002320c-2.dat acprotect -
Loads dropped DLL 2 IoCs
pid Process 4880 050b2e51ce97d0cc72c3f3c2d7fbde7a.exe 4880 050b2e51ce97d0cc72c3f3c2d7fbde7a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4880 050b2e51ce97d0cc72c3f3c2d7fbde7a.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5fe763c2d71419352141c77c310e600d2
SHA16bb51ebcbde9fe5556a74319b49bea37d5542d5e
SHA2567fdf10ca02d2238e22fda18dfbede9750da9f257221802c8b86c557c19c9bc7b
SHA512147b3a525b1fef98ae46923dcbe25edfcf7b523f347857466eefa88f09ec053ba309dfbee5f1454ec64aba0518ee21986c4b6a506f8550efb1163c8f04d7482c