Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/03/2024, 01:14

General

  • Target

    bb6cc29d3d80bdb67d2aa773fab2f766cfbf99d68474bc866ee6026796519cdd.exe

  • Size

    1.0MB

  • MD5

    2d5d7f03a0710ac25a3641c302dd13c3

  • SHA1

    efbd37b76f1054175e8398051044e9011966bfd1

  • SHA256

    bb6cc29d3d80bdb67d2aa773fab2f766cfbf99d68474bc866ee6026796519cdd

  • SHA512

    f66d26077b7a137004dd2e73f853b3d8b194308068704750c76fa1bf93325546a4c1cd75652bb2eb8bba2d50eb582bdbbc6a55d7144567b414a97cf696ba963d

  • SSDEEP

    24576:O6WJBVOrHD6WJBVOrHw6WJBVOrHw6WJBVOrHUDKkWJBVOrH:TYzOr2YzOrVYzOrVYzOrSYzOr

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb6cc29d3d80bdb67d2aa773fab2f766cfbf99d68474bc866ee6026796519cdd.exe
    "C:\Users\Admin\AppData\Local\Temp\bb6cc29d3d80bdb67d2aa773fab2f766cfbf99d68474bc866ee6026796519cdd.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4152

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4152-0-0x000000001B1F0000-0x000000001B296000-memory.dmp

    Filesize

    664KB

  • memory/4152-1-0x00007FFC2C850000-0x00007FFC2D1F1000-memory.dmp

    Filesize

    9.6MB

  • memory/4152-3-0x0000000000D20000-0x0000000000D30000-memory.dmp

    Filesize

    64KB

  • memory/4152-2-0x000000001B870000-0x000000001BD3E000-memory.dmp

    Filesize

    4.8MB

  • memory/4152-4-0x000000001BD40000-0x000000001BDDC000-memory.dmp

    Filesize

    624KB

  • memory/4152-5-0x00007FFC2C850000-0x00007FFC2D1F1000-memory.dmp

    Filesize

    9.6MB

  • memory/4152-6-0x0000000000980000-0x0000000000988000-memory.dmp

    Filesize

    32KB

  • memory/4152-7-0x000000001BE90000-0x000000001BEDC000-memory.dmp

    Filesize

    304KB

  • memory/4152-8-0x0000000000D20000-0x0000000000D30000-memory.dmp

    Filesize

    64KB

  • memory/4152-9-0x0000000000D20000-0x0000000000D30000-memory.dmp

    Filesize

    64KB

  • memory/4152-10-0x0000000000D20000-0x0000000000D30000-memory.dmp

    Filesize

    64KB

  • memory/4152-11-0x00007FFC2C850000-0x00007FFC2D1F1000-memory.dmp

    Filesize

    9.6MB

  • memory/4152-12-0x0000000000D20000-0x0000000000D30000-memory.dmp

    Filesize

    64KB

  • memory/4152-13-0x0000000000D20000-0x0000000000D30000-memory.dmp

    Filesize

    64KB

  • memory/4152-14-0x0000000000D20000-0x0000000000D30000-memory.dmp

    Filesize

    64KB

  • memory/4152-15-0x0000000000D20000-0x0000000000D30000-memory.dmp

    Filesize

    64KB

  • memory/4152-16-0x0000000000D20000-0x0000000000D30000-memory.dmp

    Filesize

    64KB