Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/05/2024, 17:58

General

  • Target

    89f051731a4bb048d6ce89622feeef58ad675bb1f11f2f0ed2d2dc88104b0f8e.exe

  • Size

    14.1MB

  • MD5

    c206a1a71a4bc670fd3788a064a62335

  • SHA1

    cc447d6a3efb679665f309a70a0fb06f1a26c198

  • SHA256

    89f051731a4bb048d6ce89622feeef58ad675bb1f11f2f0ed2d2dc88104b0f8e

  • SHA512

    deb07ee140421c704140097a0a9821d588c5582d9d8a1cc6daeef9bd5f3696de8247312d230e876d80e4a035f441790f48934d45cd947c22b1ce4fa27b9c09ef

  • SSDEEP

    393216:And8qPSTBghRL5VQBfayNb1KbR3YuzqGmMLv1j4Ms9:AOqjhZ55ypgdzqg1jB

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89f051731a4bb048d6ce89622feeef58ad675bb1f11f2f0ed2d2dc88104b0f8e.exe
    "C:\Users\Admin\AppData\Local\Temp\89f051731a4bb048d6ce89622feeef58ad675bb1f11f2f0ed2d2dc88104b0f8e.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4072

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4072-0-0x0000000000400000-0x000000000254D000-memory.dmp

    Filesize

    33.3MB

  • memory/4072-1-0x0000000000D5C000-0x0000000001740000-memory.dmp

    Filesize

    9.9MB

  • memory/4072-3-0x0000000002C20000-0x0000000002C21000-memory.dmp

    Filesize

    4KB

  • memory/4072-7-0x0000000004440000-0x0000000004441000-memory.dmp

    Filesize

    4KB

  • memory/4072-9-0x0000000004460000-0x0000000004461000-memory.dmp

    Filesize

    4KB

  • memory/4072-10-0x0000000000400000-0x000000000254D000-memory.dmp

    Filesize

    33.3MB

  • memory/4072-8-0x0000000004450000-0x0000000004451000-memory.dmp

    Filesize

    4KB

  • memory/4072-6-0x0000000004430000-0x0000000004431000-memory.dmp

    Filesize

    4KB

  • memory/4072-5-0x0000000002C50000-0x0000000002C51000-memory.dmp

    Filesize

    4KB

  • memory/4072-4-0x0000000002C30000-0x0000000002C31000-memory.dmp

    Filesize

    4KB

  • memory/4072-2-0x0000000002700000-0x0000000002701000-memory.dmp

    Filesize

    4KB

  • memory/4072-13-0x0000000000400000-0x000000000254D000-memory.dmp

    Filesize

    33.3MB

  • memory/4072-14-0x0000000000400000-0x000000000254D000-memory.dmp

    Filesize

    33.3MB

  • memory/4072-15-0x0000000000400000-0x000000000254D000-memory.dmp

    Filesize

    33.3MB

  • memory/4072-16-0x0000000000D5C000-0x0000000001740000-memory.dmp

    Filesize

    9.9MB