Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/01/2024, 11:56

General

  • Target

    74a418e67bc94d381bae2b96c1faee17.exe

  • Size

    136KB

  • MD5

    74a418e67bc94d381bae2b96c1faee17

  • SHA1

    4c82623f9099bca7ecbcd60f757f4a8626b3464b

  • SHA256

    4682230da6313d70bd257d80ee8fe0854ac216843350fe042ac25c58f85fc1ef

  • SHA512

    afbf40f4f4200ed6df70dbac15ee34f4edea54e510c55a250105d62946a34e8d4912484cb5e4f4ffaafee3a12f70b8fe0c5edf241f0ede6625297f96aa9597a5

  • SSDEEP

    1536:jOgVPwzJWY1urHjjwJDxg0trb8jJzPnGC/s+BXLE+ptlf26WLpflZK:jRwkYQPwtxZMhPGClgWjSvZK

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74a418e67bc94d381bae2b96c1faee17.exe
    "C:\Users\Admin\AppData\Local\Temp\74a418e67bc94d381bae2b96c1faee17.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4664

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4664-0-0x0000000000E50000-0x0000000000EDC000-memory.dmp

    Filesize

    560KB

  • memory/4664-1-0x0000000000E50000-0x0000000000EDC000-memory.dmp

    Filesize

    560KB

  • memory/4664-2-0x0000000000E50000-0x0000000000EDC000-memory.dmp

    Filesize

    560KB

  • memory/4664-3-0x0000000000E50000-0x0000000000EDC000-memory.dmp

    Filesize

    560KB

  • memory/4664-4-0x0000000000E50000-0x0000000000EDC000-memory.dmp

    Filesize

    560KB

  • memory/4664-5-0x0000000000E50000-0x0000000000EDC000-memory.dmp

    Filesize

    560KB

  • memory/4664-6-0x0000000000E50000-0x0000000000EDC000-memory.dmp

    Filesize

    560KB

  • memory/4664-7-0x0000000000E50000-0x0000000000EDC000-memory.dmp

    Filesize

    560KB

  • memory/4664-8-0x0000000000E50000-0x0000000000EDC000-memory.dmp

    Filesize

    560KB

  • memory/4664-9-0x0000000000E50000-0x0000000000EDC000-memory.dmp

    Filesize

    560KB

  • memory/4664-10-0x0000000000E50000-0x0000000000EDC000-memory.dmp

    Filesize

    560KB

  • memory/4664-11-0x0000000000E50000-0x0000000000EDC000-memory.dmp

    Filesize

    560KB

  • memory/4664-12-0x0000000000E50000-0x0000000000EDC000-memory.dmp

    Filesize

    560KB

  • memory/4664-13-0x0000000000E50000-0x0000000000EDC000-memory.dmp

    Filesize

    560KB

  • memory/4664-14-0x0000000000E50000-0x0000000000EDC000-memory.dmp

    Filesize

    560KB

  • memory/4664-15-0x0000000000E50000-0x0000000000EDC000-memory.dmp

    Filesize

    560KB

  • memory/4664-16-0x0000000000E50000-0x0000000000EDC000-memory.dmp

    Filesize

    560KB

  • memory/4664-17-0x0000000000E50000-0x0000000000EDC000-memory.dmp

    Filesize

    560KB