Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 23:14

General

  • Target

    1fa522eace69c777ee992e6dbb265f12.exe

  • Size

    30KB

  • MD5

    1fa522eace69c777ee992e6dbb265f12

  • SHA1

    2a21b85817d6b17e9fe44dfbe030fafee7c99351

  • SHA256

    6c756d18d3cfc0b8fb1c5650f350b52959e2187f4e91a848971c89a6c372b191

  • SHA512

    424e0d6f4eada73f2d6ee06f8570d0ca61a45ea066fad6bfca0d221e865376c5027bde7cc555590cc8eaadabf6433738fe0f416f9f1bb80ba675f10e9f27310d

  • SSDEEP

    384:7Q1j7OgtcZh6PPaxdvkXOFa3m2K0475vlNryU6EiU74biwj:0t7Ovk4dviFGNnrIzUDwj

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1fa522eace69c777ee992e6dbb265f12.exe
    "C:\Users\Admin\AppData\Local\Temp\1fa522eace69c777ee992e6dbb265f12.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Users\Admin\AppData\Local\Temp\1fa522eace69c777ee992e6dbb265f12.exe
      C:\Users\Admin\AppData\Local\Temp\1fa522eace69c777ee992e6dbb265f12.exe
      2⤵
        PID:2304

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2304-2-0x0000000000400000-0x0000000000402000-memory.dmp

      Filesize

      8KB

    • memory/2304-4-0x0000000000400000-0x0000000000402000-memory.dmp

      Filesize

      8KB

    • memory/2304-6-0x0000000000400000-0x0000000000402000-memory.dmp

      Filesize

      8KB

    • memory/2304-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2304-10-0x0000000000400000-0x0000000000402000-memory.dmp

      Filesize

      8KB

    • memory/2304-11-0x0000000000400000-0x0000000000402000-memory.dmp

      Filesize

      8KB

    • memory/2304-13-0x0000000000400000-0x00000000004016E1-memory.dmp

      Filesize

      5KB