Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/01/2024, 21:33

General

  • Target

    41f66ec47530581ccbe90e13d4b48941.exe

  • Size

    116KB

  • MD5

    41f66ec47530581ccbe90e13d4b48941

  • SHA1

    96e5a7281f99ac371b9b969bf8897c0b4f065e1f

  • SHA256

    86d6147e1a897de9c654c876e19986791f6a6a377b1f704e6d3ad721d5fd41d4

  • SHA512

    561a4175c1b5b9a77b7e08656f87d8c580a9a339a3d2ea9f7151cd307d2dff16a28c886568620f1f1366b392f6f618ba159c480944e53f3eb2bd0df7f47ed5ea

  • SSDEEP

    1536:HgooIUtekIOkoFt+ZABZk4DYyVSAq7h3IXkGjbFcs2joUxfFTbsSaP2dHzmk:ARIEeBoLRB8yVSztYdXF3RCFTN3K

Score
1/10

Malware Config

Signatures

  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41f66ec47530581ccbe90e13d4b48941.exe
    "C:\Users\Admin\AppData\Local\Temp\41f66ec47530581ccbe90e13d4b48941.exe"
    1⤵
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1888
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1220

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1220-1-0x00000000024B0000-0x00000000024B9000-memory.dmp

      Filesize

      36KB

    • memory/1220-3-0x00000000024B0000-0x00000000024B9000-memory.dmp

      Filesize

      36KB

    • memory/1888-4-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/1888-2-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/1888-0-0x0000000000020000-0x0000000000022000-memory.dmp

      Filesize

      8KB