Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    110s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/01/2024, 11:02

General

  • Target

    461046fa996ffb64c3dd68611db7bae5.exe

  • Size

    585KB

  • MD5

    461046fa996ffb64c3dd68611db7bae5

  • SHA1

    6f09fd8e492c060bbe945e29e1b86bcaf014f963

  • SHA256

    62901de258dad5d5876664a808664081a4df79ca7e5ced2d7d0a8a197e502efb

  • SHA512

    181f3a3a589a32049720be4239f75979c9338bf9d729b980642b1a244bf265e3bde5d738bceb31bea510a644afba8b6f8282d7b88a8530339d17a6dd2c14c41c

  • SSDEEP

    12288:AZwRBhsdpYeqH8KE4RbOgp77PEWnmxB4DxmqsopGu:ACRBhsjY0KE2x7PJmxB4DU3wGu

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\461046fa996ffb64c3dd68611db7bae5.exe
    "C:\Users\Admin\AppData\Local\Temp\461046fa996ffb64c3dd68611db7bae5.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:5072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5072-0-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/5072-1-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/5072-2-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/5072-3-0x0000000000730000-0x0000000000731000-memory.dmp

    Filesize

    4KB

  • memory/5072-141-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/5072-142-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/5072-144-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/5072-143-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/5072-145-0x0000000000730000-0x0000000000731000-memory.dmp

    Filesize

    4KB

  • memory/5072-146-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/5072-147-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/5072-148-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/5072-150-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/5072-151-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/5072-152-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/5072-153-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/5072-154-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/5072-155-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/5072-156-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/5072-157-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB

  • memory/5072-158-0x0000000000400000-0x0000000000521000-memory.dmp

    Filesize

    1.1MB