Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2024, 07:40 UTC

General

  • Target

    反聚生/ActArp_MemKey.exe

  • Size

    18KB

  • MD5

    8f911ce328d5828494808c464d16fd80

  • SHA1

    160234948e98b00c2013e8836fd72389e382e32d

  • SHA256

    c50e50227d66850ef74e9a9822fd8e3c76c8c633133c5f4d1a2c3b47e6e200a9

  • SHA512

    8168a2948239005da384f4e72366d93a18d30968963b8ae5cf1183c69e0fa36a69a52ac330caf155ae0a6e68eb4d133cad08363ba761b5ea2e99b1b336c4ba83

  • SSDEEP

    192:dF833cktJVwz7KD20O/XJjHIv8BtRtpusfuGI86zrvHL/vlANQmNJQU++0b/s9qt:b9ktnOvCUzjYbGILvDvlOwDs9f

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\反聚生\ActArp_MemKey.exe
    "C:\Users\Admin\AppData\Local\Temp\反聚生\ActArp_MemKey.exe"
    1⤵
      PID:2016

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2016-0-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.