Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18/01/2025, 18:15

General

  • Target

    ResidentEvil7Biohazardv1.0-v20220613Plus14Trainer.exe

  • Size

    1.2MB

  • MD5

    17d3f8bea5b7213dd24273b4c9df7073

  • SHA1

    4a8aa865dcc911313dbd503922ebf92728187bd7

  • SHA256

    18c9196e00b0740a26d4925f18ed2944e2700f4cf91cca2c1bad3a769c85753c

  • SHA512

    bbee979c3e7da7c9575a29b9fb9146bb97f76b5690028ad98fb13f8c6540b886fd5c39e7a69092d260516ba3f8a532ccf76936610e836f962749ac2aadf1469f

  • SSDEEP

    24576:wYUrQABbyYRTRyJYzOuA47p03qgGKpigjU8K5KVIDSSPcm4bJ7:KMABbRtyUlpF8KVKV7

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ResidentEvil7Biohazardv1.0-v20220613Plus14Trainer.exe
    "C:\Users\Admin\AppData\Local\Temp\ResidentEvil7Biohazardv1.0-v20220613Plus14Trainer.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2948

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2948-0-0x000007FEF5E33000-0x000007FEF5E34000-memory.dmp

    Filesize

    4KB

  • memory/2948-1-0x0000000001CE0000-0x0000000001D28000-memory.dmp

    Filesize

    288KB

  • memory/2948-2-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2948-3-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2948-4-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2948-5-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2948-6-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2948-10-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2948-11-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2948-12-0x000007FEF5E33000-0x000007FEF5E34000-memory.dmp

    Filesize

    4KB

  • memory/2948-13-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2948-14-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2948-15-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2948-16-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2948-17-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2948-18-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2948-19-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB