Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    26/06/2024, 01:47

General

  • Target

    8ef92f3aae4200a94fe1c6ec619e76dca70800fc117d7d10a5a5d03f51f0f1be.exe

  • Size

    6.8MB

  • MD5

    07ec97ec214ced4533024899e1088430

  • SHA1

    2c699807e641dd37ae85311f4a2b869e73bfba5e

  • SHA256

    8ef92f3aae4200a94fe1c6ec619e76dca70800fc117d7d10a5a5d03f51f0f1be

  • SHA512

    21928826f5f19ce7d76cea3605959fdeef30b249976901bd89d2d08e01f003e10a66feba3a28d99e41cf9f782cadf274c657eab5c52221f6501d0710c138c3a8

  • SSDEEP

    196608:/WPO0pEgfHwTWmqSYQO4UFfsNxnweTpuj:/WfEgfQTn1zHUFMaO

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ef92f3aae4200a94fe1c6ec619e76dca70800fc117d7d10a5a5d03f51f0f1be.exe
    "C:\Users\Admin\AppData\Local\Temp\8ef92f3aae4200a94fe1c6ec619e76dca70800fc117d7d10a5a5d03f51f0f1be.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1916

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1916-0-0x0000000000400000-0x0000000001045000-memory.dmp

    Filesize

    12.3MB

  • memory/1916-36-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/1916-39-0x0000000000400000-0x0000000001045000-memory.dmp

    Filesize

    12.3MB

  • memory/1916-34-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/1916-31-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/1916-29-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/1916-26-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/1916-24-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/1916-21-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/1916-19-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/1916-16-0x0000000000621000-0x0000000000972000-memory.dmp

    Filesize

    3.3MB

  • memory/1916-15-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/1916-13-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/1916-11-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/1916-10-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/1916-8-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/1916-6-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/1916-5-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1916-3-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1916-1-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1916-40-0x0000000000400000-0x0000000001045000-memory.dmp

    Filesize

    12.3MB

  • memory/1916-41-0x0000000000621000-0x0000000000972000-memory.dmp

    Filesize

    3.3MB

  • memory/1916-42-0x0000000000400000-0x0000000001045000-memory.dmp

    Filesize

    12.3MB