Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
60s -
max time network
60s -
platform
windows7_x64 -
resource
win7 -
submitted
10/07/2020, 08:19
Static task
static1
Behavioral task
behavioral1
Sample
Quotation_Request_IMAGE001_IMAGE002_IMAGE003_IMAGE004.exe_.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Quotation_Request_IMAGE001_IMAGE002_IMAGE003_IMAGE004.exe_.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
Quotation_Request_IMAGE001_IMAGE002_IMAGE003_IMAGE004.exe_.exe
-
Size
968KB
-
MD5
3270f89a953f6ba0eab5ebc529b313d2
-
SHA1
896101735f27c2b40695bb7727dcb889f61afb74
-
SHA256
1e13e14b2d390dc75cc450654d0201bb43366bc2e4a028e0f5566630fea12630
-
SHA512
135bff4e7d2e9a82019589ecb6b362a96acdc925ef54e92d72bf94380a65f86241835b91ce5a663e2ee8d4f5792e88ff711eae3d1a5353de6383057667aea17c
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1492 set thread context of 1600 1492 Quotation_Request_IMAGE001_IMAGE002_IMAGE003_IMAGE004.exe_.exe 24 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1600 Quotation_Request_IMAGE001_IMAGE002_IMAGE003_IMAGE004.exe_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1600 1492 Quotation_Request_IMAGE001_IMAGE002_IMAGE003_IMAGE004.exe_.exe 24 PID 1492 wrote to memory of 1600 1492 Quotation_Request_IMAGE001_IMAGE002_IMAGE003_IMAGE004.exe_.exe 24 PID 1492 wrote to memory of 1600 1492 Quotation_Request_IMAGE001_IMAGE002_IMAGE003_IMAGE004.exe_.exe 24 PID 1492 wrote to memory of 1600 1492 Quotation_Request_IMAGE001_IMAGE002_IMAGE003_IMAGE004.exe_.exe 24 PID 1492 wrote to memory of 1600 1492 Quotation_Request_IMAGE001_IMAGE002_IMAGE003_IMAGE004.exe_.exe 24 PID 1492 wrote to memory of 1600 1492 Quotation_Request_IMAGE001_IMAGE002_IMAGE003_IMAGE004.exe_.exe 24 PID 1492 wrote to memory of 1600 1492 Quotation_Request_IMAGE001_IMAGE002_IMAGE003_IMAGE004.exe_.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quotation_Request_IMAGE001_IMAGE002_IMAGE003_IMAGE004.exe_.exe"C:\Users\Admin\AppData\Local\Temp\Quotation_Request_IMAGE001_IMAGE002_IMAGE003_IMAGE004.exe_.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\Quotation_Request_IMAGE001_IMAGE002_IMAGE003_IMAGE004.exe_.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600
-