Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/03/2024, 07:51

General

  • Target

    c2d7621782916ae82105fcd78ec70d8e.exe

  • Size

    715KB

  • MD5

    c2d7621782916ae82105fcd78ec70d8e

  • SHA1

    d7a1f2b762f393bc46259e9d76f60ae3b4a5863a

  • SHA256

    7b1791f797ff5cd657e3b767917cf8675f4b2b67bf8f04fc74ff86b7bb09f7d6

  • SHA512

    9ba74204562977b308fb45da52263755acfb96696b32d1b0f2c5800ce69dfe805b309624e4e562f02f584a29eb7775b4433a0acb9b1954526774b3ef397d3fe0

  • SSDEEP

    12288:/5e24cSkKAw/Bg9ZIYxQwiuG9j3fhnbco370vRjEYjNcv2vBUwDFgbJS6UHXR:/cHcSkKABZzm3370ZVjNccRDW9UHXR

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2d7621782916ae82105fcd78ec70d8e.exe
    "C:\Users\Admin\AppData\Local\Temp\c2d7621782916ae82105fcd78ec70d8e.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:5104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\mediaget-installer-tmp\scripts\jquery.js

    Filesize

    89KB

    MD5

    a34f78c3aecd182144818eb4b7303fda

    SHA1

    6fca78dac2797c02d86a4bf6514eda398b7dbe62

    SHA256

    c784376960f3163dc760bc019e72e5fed78203745a5510c69992a39d1d8fe776

    SHA512

    ddec07100503fdad6655d4e90aaac246719e9667611b35b112e4694e2671b43f4c4ef0b87371d3a6e173f7ade9dfd2058e5e165a41c3a250007d49ec18f2419c

  • C:\Users\Admin\AppData\Local\Temp\mediaget-installer-tmp\scripts\scripts.js

    Filesize

    2KB

    MD5

    05eb1515de7c2f98c5c63e794bff984b

    SHA1

    6a1efc4aa8ac2ddb290e2fce960a6a0d081f8463

    SHA256

    c27f9ed4ec6c89264cd61e182a488cc86c54c5f013f8661e4363147830dfef03

    SHA512

    2964f2bae7bd59c73ec37f1e9ac9182f3360d137415ce728246afcffcbc15fc97a037df6c9445451fe09c9e57e6ddc0ee7cb5b9d3a4386feefe9309c05f7f78d

  • memory/5104-0-0x0000000000400000-0x00000000005B3000-memory.dmp

    Filesize

    1.7MB

  • memory/5104-1-0x0000000000BA0000-0x0000000000BA1000-memory.dmp

    Filesize

    4KB

  • memory/5104-108-0x0000000000400000-0x00000000005B3000-memory.dmp

    Filesize

    1.7MB

  • memory/5104-110-0x0000000000BA0000-0x0000000000BA1000-memory.dmp

    Filesize

    4KB