Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 20:54

General

  • Target

    3c636d24249acefb86187b41a5aae0f2.exe

  • Size

    249KB

  • MD5

    3c636d24249acefb86187b41a5aae0f2

  • SHA1

    935a7445eb619eccca20ee7925e98ab3b4ecb40a

  • SHA256

    204dece60d1c0517904018a54f9d551465e8134e0abe0685acfc3471b63981b3

  • SHA512

    8bf7b26e94925c27c0d62cd54cd123dd5d7655deb4408ce6124985e3d567722e8f01a2ada9d43af70a55bac6752f73ee2864db9fc0b82964ce82f5e5018d0cd9

  • SSDEEP

    3072:YuVP4+GLNodhJRU01DW+3JExtKkdymrezoLF4CbQdo74v8hAr2edtJ6IOu5yu+pr:jP24l15JgYk0+vLH0khKtJBbOpz/cOT

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c636d24249acefb86187b41a5aae0f2.exe
    "C:\Users\Admin\AppData\Local\Temp\3c636d24249acefb86187b41a5aae0f2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2540

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\ial657.tmp

    Filesize

    62KB

    MD5

    2f9e451c21aab03d3504c249ecf87d84

    SHA1

    7bc3ff595a6f5ca7d82e95810bfbaf323c13ac1a

    SHA256

    e4baedbbf94124cc9f7659851245fd19f7c05fe1b5a8f5c743d5bbc14a6cd0c3

    SHA512

    9f9d5116e6ab58b8533c5d0a0b60aced6cf568b7ec6cf2299745c5f80b279d9878e9fc7330db5a00e901bc95dfc6ecfd65fc4dc273601892272c854ba3e7ed16

  • memory/2540-4-0x0000000001BB0000-0x0000000001C23000-memory.dmp

    Filesize

    460KB

  • memory/2540-1-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2540-6-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2540-5-0x0000000001BB0000-0x0000000001C23000-memory.dmp

    Filesize

    460KB