Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
184s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
26/06/2022, 01:42
Static task
static1
Behavioral task
behavioral1
Sample
36b479ded61740bb4c479a7969d5d1e469173fe50d4378074f14d5c0fb52d3bc.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
36b479ded61740bb4c479a7969d5d1e469173fe50d4378074f14d5c0fb52d3bc.exe
Resource
win10v2004-20220414-en
General
-
Target
36b479ded61740bb4c479a7969d5d1e469173fe50d4378074f14d5c0fb52d3bc.exe
-
Size
1.1MB
-
MD5
42d6eb88c4a77bd128d3dc9c0e4803d0
-
SHA1
622ed276c5e468886f2a971c0322092b0f9256af
-
SHA256
36b479ded61740bb4c479a7969d5d1e469173fe50d4378074f14d5c0fb52d3bc
-
SHA512
db40be563b4a476b7c7a34d599bdb3e53ed0f7688fd799b5066913e26cd7f935b95478de43c1c853d3c3e95f8f27e74180713b08b4b7fe93dc86950fe3b1e587
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/916-54-0x00000000009F0000-0x0000000000C07000-memory.dmp vmprotect behavioral1/files/0x000a000000003c9f-56.dat vmprotect behavioral1/memory/916-58-0x0000000074700000-0x00000000748EE000-memory.dmp vmprotect behavioral1/memory/916-62-0x00000000009F0000-0x0000000000C07000-memory.dmp vmprotect -
Loads dropped DLL 1 IoCs
pid Process 916 36b479ded61740bb4c479a7969d5d1e469173fe50d4378074f14d5c0fb52d3bc.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 916 36b479ded61740bb4c479a7969d5d1e469173fe50d4378074f14d5c0fb52d3bc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\36b479ded61740bb4c479a7969d5d1e469173fe50d4378074f14d5c0fb52d3bc.exe"C:\Users\Admin\AppData\Local\Temp\36b479ded61740bb4c479a7969d5d1e469173fe50d4378074f14d5c0fb52d3bc.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:916
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
926KB
MD52cf9571e824f00979d98988fef49f863
SHA16780128df2fc651eb907ae279ef1c81c3173d952
SHA25608b37388018ebe1640f3fb8de42cb19e3302a8fbb580a7ddf5fbcdbb9ed576ea
SHA512f21f45425e49b3a7caa17f81d827c02dbd92a06da39ec49f8d05215161b205d99d064eaaddf4098b2036164401c66b91e431b4abdd4b60529dfc7c590d9515ec