Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    13/03/2025, 15:07

General

  • Target

    RestructuringStorage/Ad.cda

  • Size

    97KB

  • MD5

    9d76009030cebd2b61637a2ff632633b

  • SHA1

    2594cd1ffd229cdfbbba6af8c3794d909c4a75c5

  • SHA256

    2f3da93ec99eda38f4e0c0e9b4f43d4d11f230a5a415879e80ae5025e52ec752

  • SHA512

    6ba7e6fa500b5c99a8c3c8b8bbf94b91b4f4222b715616e32bcb89d5217cef3ba783df3ec5c1fc7617661123d7ec67d2ebac079e2a9a526ea308587731c37e5f

  • SSDEEP

    3072:8/r0/UEa5CXp/2t08HtJmyAKc4mYtg0OSymA1r762Fch:U0UToV2y8HzDcZKg0OGA1rjc

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Program Files\VideoLAN\VLC\vlc.exe
    "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\RestructuringStorage\Ad.cda"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:3964

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3964-1-0x00007FFCB51F0000-0x00007FFCB5224000-memory.dmp

    Filesize

    208KB

  • memory/3964-0-0x00007FF644E50000-0x00007FF644F48000-memory.dmp

    Filesize

    992KB

  • memory/3964-5-0x00007FFCB50F0000-0x00007FFCB5101000-memory.dmp

    Filesize

    68KB

  • memory/3964-9-0x00007FFCB2380000-0x00007FFCB2391000-memory.dmp

    Filesize

    68KB

  • memory/3964-8-0x00007FFCB23A0000-0x00007FFCB23BD000-memory.dmp

    Filesize

    116KB

  • memory/3964-7-0x00007FFCB23C0000-0x00007FFCB23D1000-memory.dmp

    Filesize

    68KB

  • memory/3964-10-0x00007FFCAECF0000-0x00007FFCAEEFB000-memory.dmp

    Filesize

    2.0MB

  • memory/3964-25-0x00007FFCAEC10000-0x00007FFCAEC67000-memory.dmp

    Filesize

    348KB

  • memory/3964-24-0x00007FFCB15B0000-0x00007FFCB15C1000-memory.dmp

    Filesize

    68KB

  • memory/3964-23-0x00007FFCAEC70000-0x00007FFCAECEC000-memory.dmp

    Filesize

    496KB

  • memory/3964-22-0x00007FFCB15D0000-0x00007FFCB1637000-memory.dmp

    Filesize

    412KB

  • memory/3964-11-0x00007FFC9FDB0000-0x00007FFCA0E60000-memory.dmp

    Filesize

    16.7MB

  • memory/3964-21-0x00007FFCB1640000-0x00007FFCB1670000-memory.dmp

    Filesize

    192KB

  • memory/3964-20-0x00007FFCB1670000-0x00007FFCB1688000-memory.dmp

    Filesize

    96KB

  • memory/3964-19-0x00007FFCB21D0000-0x00007FFCB21E1000-memory.dmp

    Filesize

    68KB

  • memory/3964-18-0x00007FFCB2260000-0x00007FFCB227B000-memory.dmp

    Filesize

    108KB

  • memory/3964-17-0x00007FFCB2280000-0x00007FFCB2291000-memory.dmp

    Filesize

    68KB

  • memory/3964-16-0x00007FFCB22A0000-0x00007FFCB22B1000-memory.dmp

    Filesize

    68KB

  • memory/3964-15-0x00007FFCB22C0000-0x00007FFCB22D1000-memory.dmp

    Filesize

    68KB

  • memory/3964-14-0x00007FFCB22E0000-0x00007FFCB22F8000-memory.dmp

    Filesize

    96KB

  • memory/3964-13-0x00007FFCB2300000-0x00007FFCB2321000-memory.dmp

    Filesize

    132KB

  • memory/3964-12-0x00007FFCB2330000-0x00007FFCB2371000-memory.dmp

    Filesize

    260KB

  • memory/3964-6-0x00007FFCB23E0000-0x00007FFCB23F7000-memory.dmp

    Filesize

    92KB

  • memory/3964-2-0x00007FFCB18C0000-0x00007FFCB1B76000-memory.dmp

    Filesize

    2.7MB

  • memory/3964-4-0x00007FFCB5190000-0x00007FFCB51A7000-memory.dmp

    Filesize

    92KB

  • memory/3964-3-0x00007FFCB7250000-0x00007FFCB7268000-memory.dmp

    Filesize

    96KB

  • memory/3964-26-0x0000024B6CE40000-0x0000024B6E6AF000-memory.dmp

    Filesize

    24.4MB