Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28/01/2024, 10:37 UTC

General

  • Target

    7ce6c417c4dcc18d3814be3952a7f59a.exe

  • Size

    43KB

  • MD5

    7ce6c417c4dcc18d3814be3952a7f59a

  • SHA1

    3a65c1ff41bcad70af40d75465256ebaeed77994

  • SHA256

    ecaa1c280350845a2c043a7d3244efefc8a671291f81b81cec0060af1ce198ca

  • SHA512

    cfb016b4a4d3b9ec0cee411016e69aba91f8323f1e0200256503f4c795ad089527f738141909dbd3dfa0f88d1de633d01a18836fef884b5385267affa7ab0a25

  • SSDEEP

    768:wC19DlJj0nxV8gMxXyyAdCWM67ayAZCQ3th5aO2rqsNwiE0Q14Psr7DL:wCPRzxXG57aylQ9hr1svE084kP

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ce6c417c4dcc18d3814be3952a7f59a.exe
    "C:\Users\Admin\AppData\Local\Temp\7ce6c417c4dcc18d3814be3952a7f59a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\7ce6c417c4dcc18d3814be3952a7f59a.exe
      "C:\Users\Admin\AppData\Local\Temp\7ce6c417c4dcc18d3814be3952a7f59a.exe"
      2⤵
        PID:2676

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1732-0-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1732-7-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2676-3-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2676-4-0x0000000000400000-0x00000000004083A0-memory.dmp

      Filesize

      32KB

    • memory/2676-6-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2676-8-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2676-9-0x0000000010000000-0x0000000010012000-memory.dmp

      Filesize

      72KB

    • memory/2676-10-0x0000000000400000-0x00000000004083A0-memory.dmp

      Filesize

      32KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.