Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

20/07/2024, 17:01

240720-vjk4cswbkp 7

20/07/2024, 16:55

240720-ve8nvstgkb 7

20/07/2024, 16:53

240720-vedtgswamn 7

Analysis

  • max time kernel
    34s
  • max time network
    10s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20/07/2024, 16:53

General

  • Target

    RVVNfAFuoPUg.exe

  • Size

    20.5MB

  • MD5

    e5bb4ca071b4a7f32467d4260fef5610

  • SHA1

    7e950adae620544f07a3b455546e498a6ac2c4d0

  • SHA256

    f9cb65c4d208ba89805850d0ea1e2d9853236ac21ad1f93a4f263f377ddd614c

  • SHA512

    065cd30ca5bd18bc9d7be0c3700f1f6282b2525f59d741e3a0476d0572b4b0c90f077ecedc0aea4df7eded285948a9ebc54b8192fc2260862b9999c564ab7ca2

  • SSDEEP

    393216:HNZI9KZ5ikvL+rWGtlqSfBI5xX4LH4pYZv7ugs7G2pWCL6o+DhUOvNR:U9KZ4kvqrh/hfBI5xXoH4KZviTGDaOvf

Score
7/10

Malware Config

Signatures

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RVVNfAFuoPUg.exe
    "C:\Users\Admin\AppData\Local\Temp\RVVNfAFuoPUg.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2560

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2560-0-0x0000000140DB1000-0x00000001414F2000-memory.dmp

    Filesize

    7.3MB

  • memory/2560-1-0x00007FF9ED3F0000-0x00007FF9ED3F2000-memory.dmp

    Filesize

    8KB

  • memory/2560-2-0x00007FF9ED400000-0x00007FF9ED402000-memory.dmp

    Filesize

    8KB

  • memory/2560-3-0x00007FF9ED410000-0x00007FF9ED412000-memory.dmp

    Filesize

    8KB

  • memory/2560-4-0x00007FF9ED420000-0x00007FF9ED422000-memory.dmp

    Filesize

    8KB

  • memory/2560-5-0x00007FF9ED430000-0x00007FF9ED432000-memory.dmp

    Filesize

    8KB

  • memory/2560-6-0x00007FF9ED440000-0x00007FF9ED442000-memory.dmp

    Filesize

    8KB

  • memory/2560-7-0x00007FF9ED450000-0x00007FF9ED452000-memory.dmp

    Filesize

    8KB

  • memory/2560-8-0x00007FF9ED460000-0x00007FF9ED462000-memory.dmp

    Filesize

    8KB

  • memory/2560-9-0x00007FF9ED470000-0x00007FF9ED472000-memory.dmp

    Filesize

    8KB

  • memory/2560-13-0x00007FF9ED4B0000-0x00007FF9ED4B2000-memory.dmp

    Filesize

    8KB

  • memory/2560-12-0x00007FF9ED4A0000-0x00007FF9ED4A2000-memory.dmp

    Filesize

    8KB

  • memory/2560-11-0x00007FF9ED490000-0x00007FF9ED492000-memory.dmp

    Filesize

    8KB

  • memory/2560-10-0x00007FF9ED480000-0x00007FF9ED482000-memory.dmp

    Filesize

    8KB

  • memory/2560-14-0x00007FF9ED4C0000-0x00007FF9ED4C2000-memory.dmp

    Filesize

    8KB

  • memory/2560-15-0x00007FF9ED4D0000-0x00007FF9ED4D2000-memory.dmp

    Filesize

    8KB

  • memory/2560-16-0x00007FF9ED4E0000-0x00007FF9ED4E2000-memory.dmp

    Filesize

    8KB

  • memory/2560-17-0x00007FF9ED4F0000-0x00007FF9ED4F2000-memory.dmp

    Filesize

    8KB

  • memory/2560-21-0x0000000140000000-0x000000014296B000-memory.dmp

    Filesize

    41.4MB

  • memory/2560-24-0x0000000140DB1000-0x00000001414F2000-memory.dmp

    Filesize

    7.3MB

  • memory/2560-25-0x0000000140000000-0x000000014296B000-memory.dmp

    Filesize

    41.4MB