Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 21:02

General

  • Target

    c881bb5a8a238cae4fe55d59214517705aaf136abed50eb78e2210e31e975944.exe

  • Size

    10.8MB

  • MD5

    1ba83bd488d4e82f9965c351576d69ed

  • SHA1

    ca99219df3aa99080df5153c3e67180e02a8b3ed

  • SHA256

    c881bb5a8a238cae4fe55d59214517705aaf136abed50eb78e2210e31e975944

  • SHA512

    66731288b9aea43ae509f6382cbcf94d32619cc98b3162e8057a17a0b3bb9ca9df1af62b2f746199a87c42d412833f2118bcc5cbf7ee8c5a51820280e366a6ec

  • SSDEEP

    196608:OqdFgW+tBGo3vY6j/2vQgQctSpiN9s5TZHdxMkL44r+zidLWo6lQ9rWA:tPIhY6jLgQctS+4nGkL44K2LWo6l

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c881bb5a8a238cae4fe55d59214517705aaf136abed50eb78e2210e31e975944.exe
    "C:\Users\Admin\AppData\Local\Temp\c881bb5a8a238cae4fe55d59214517705aaf136abed50eb78e2210e31e975944.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2032

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2032-40-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/2032-38-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/2032-35-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2032-33-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2032-30-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2032-28-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2032-41-0x0000000000400000-0x0000000001592000-memory.dmp

    Filesize

    17.6MB

  • memory/2032-25-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/2032-23-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/2032-20-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2032-18-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2032-16-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2032-15-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2032-13-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2032-11-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2032-10-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2032-8-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2032-6-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2032-5-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2032-3-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2032-1-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2032-0-0x00000000004B5000-0x0000000000ACC000-memory.dmp

    Filesize

    6.1MB

  • memory/2032-45-0x00000000004B5000-0x0000000000ACC000-memory.dmp

    Filesize

    6.1MB

  • memory/2032-46-0x0000000000400000-0x0000000001592000-memory.dmp

    Filesize

    17.6MB

  • memory/2032-47-0x0000000000400000-0x0000000001592000-memory.dmp

    Filesize

    17.6MB

  • memory/2032-48-0x0000000000400000-0x0000000001592000-memory.dmp

    Filesize

    17.6MB