Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2024, 12:44

General

  • Target

    SecuriteInfo.com.FileRepMalware.8279.19195.exe

  • Size

    378KB

  • MD5

    c7136e4d410967c326415bde4a024974

  • SHA1

    8e2bca333e7d9fdc3bd4809457c79319c7930cf3

  • SHA256

    00859bfbd8b26f88702e0b8443200754a2ad57013f6fdc79d01fa33380e6dc23

  • SHA512

    0a6cfbae90ebeeee5ca6dc6d9865f99d1d5c77a5ff410fbdc970a972fe919e756ec493aa89104dfd7f5876241c8c71fed8fbc3f9e0988484e6985b4c73430177

  • SSDEEP

    6144:ZZhF2idZecnl20lHRxp3gb3OK7HQeFRMFavQYYj0fPFSe8DN26vMObWW:rbF3Z4mxxWHZFRMUnYogCKp

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.FileRepMalware.8279.19195.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.FileRepMalware.8279.19195.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4760

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4760-0-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/4760-1-0x0000000002180000-0x00000000021D4000-memory.dmp

    Filesize

    336KB

  • memory/4760-3-0x0000000000580000-0x0000000000581000-memory.dmp

    Filesize

    4KB

  • memory/4760-2-0x00000000005A0000-0x00000000005A1000-memory.dmp

    Filesize

    4KB

  • memory/4760-4-0x0000000002140000-0x0000000002141000-memory.dmp

    Filesize

    4KB

  • memory/4760-6-0x0000000000550000-0x0000000000551000-memory.dmp

    Filesize

    4KB

  • memory/4760-7-0x0000000000540000-0x0000000000541000-memory.dmp

    Filesize

    4KB

  • memory/4760-8-0x0000000002130000-0x0000000002131000-memory.dmp

    Filesize

    4KB

  • memory/4760-9-0x0000000002120000-0x0000000002121000-memory.dmp

    Filesize

    4KB

  • memory/4760-10-0x0000000003A20000-0x0000000003A21000-memory.dmp

    Filesize

    4KB

  • memory/4760-12-0x0000000002150000-0x0000000002151000-memory.dmp

    Filesize

    4KB

  • memory/4760-13-0x0000000003A10000-0x0000000003A19000-memory.dmp

    Filesize

    36KB

  • memory/4760-15-0x0000000002200000-0x0000000002201000-memory.dmp

    Filesize

    4KB

  • memory/4760-14-0x0000000002220000-0x0000000002221000-memory.dmp

    Filesize

    4KB

  • memory/4760-16-0x0000000002250000-0x0000000002251000-memory.dmp

    Filesize

    4KB

  • memory/4760-17-0x00000000021E0000-0x00000000021E1000-memory.dmp

    Filesize

    4KB

  • memory/4760-18-0x0000000002170000-0x0000000002171000-memory.dmp

    Filesize

    4KB

  • memory/4760-19-0x0000000002240000-0x0000000002241000-memory.dmp

    Filesize

    4KB

  • memory/4760-20-0x0000000002230000-0x0000000002231000-memory.dmp

    Filesize

    4KB

  • memory/4760-21-0x0000000002260000-0x0000000002261000-memory.dmp

    Filesize

    4KB

  • memory/4760-23-0x00000000021F0000-0x00000000021F1000-memory.dmp

    Filesize

    4KB

  • memory/4760-24-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/4760-26-0x0000000002180000-0x00000000021D4000-memory.dmp

    Filesize

    336KB

  • memory/4760-25-0x0000000002B20000-0x0000000002B21000-memory.dmp

    Filesize

    4KB

  • memory/4760-27-0x0000000002B00000-0x0000000002B01000-memory.dmp

    Filesize

    4KB