Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02/05/2022, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
27d6e6cd3ff5d26a814eb1439919a61d6725856065401c51e477e62f9fcf6fa7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
27d6e6cd3ff5d26a814eb1439919a61d6725856065401c51e477e62f9fcf6fa7.exe
Resource
win10v2004-20220414-en
General
-
Target
27d6e6cd3ff5d26a814eb1439919a61d6725856065401c51e477e62f9fcf6fa7.exe
-
Size
482KB
-
MD5
4bdb473e70c6c7e688e15049f103cd5d
-
SHA1
d64100709ae9cb4968dd5d6e5d526b6c10b87678
-
SHA256
27d6e6cd3ff5d26a814eb1439919a61d6725856065401c51e477e62f9fcf6fa7
-
SHA512
d774898c41c70096cf601edf2b3fbe92181119f490909ac9b17eb3fc08d5131b6c9d29d4451bb78e232893a23789c2a5923f8a7c23eaf030a7297b448831caa2
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet Payload 1 IoCs
resource yara_rule behavioral1/memory/960-56-0x0000000010000000-0x0000000010017000-memory.dmp unk_chinese_botnet -
resource yara_rule behavioral1/memory/960-56-0x0000000010000000-0x0000000010017000-memory.dmp vmprotect -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 960 27d6e6cd3ff5d26a814eb1439919a61d6725856065401c51e477e62f9fcf6fa7.exe