Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/04/2024, 04:38

General

  • Target

    citra-windows-msvc-20240303-0ff3440\citra-qt.exe

  • Size

    27.5MB

  • MD5

    c1331abf422e09065a0cd2c967e10e39

  • SHA1

    9110fe0d9d063a2a02d04f36d600a96ba3ad66fe

  • SHA256

    8450b9bf8caec4e9ede9fd20495d0dae52c36e37c119c4be6aee706f66a62ac2

  • SHA512

    fd2d52133aec16517a4a1ff59b261b7450d1021e8f00f18f1f7678c21b376c24c4e97a99d74a6ed42fcbcfc05272a12c415a99d48a56f266561617cc5b1b0142

  • SSDEEP

    393216:4YnBTuiKj4mDvlXb/NG7bzbSGJNoheiYL5R2WGnf2yoQzBsW1Ukcl4n4/Aw7wZvs:4IBCeW0Ivi

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\citra-windows-msvc-20240303-0ff3440\citra-qt.exe
    "C:\Users\Admin\AppData\Local\Temp\citra-windows-msvc-20240303-0ff3440\citra-qt.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:3492
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3492-1-0x00007FF99F1B0000-0x00007FF99F7DA000-memory.dmp

    Filesize

    6.2MB

  • memory/3492-0-0x00007FF7997A0000-0x00007FF79A7A0000-memory.dmp

    Filesize

    16.0MB

  • memory/3492-3-0x000002B38CB80000-0x000002B38CB90000-memory.dmp

    Filesize

    64KB