Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 02:55
Static task
static1
Behavioral task
behavioral1
Sample
7918606f0e9b7ced3185f1a355999767c0d474d59297e93c673213465b581a32.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7918606f0e9b7ced3185f1a355999767c0d474d59297e93c673213465b581a32.exe
Resource
win10v2004-20220812-en
General
-
Target
7918606f0e9b7ced3185f1a355999767c0d474d59297e93c673213465b581a32.exe
-
Size
352KB
-
MD5
c82cfb314fef291b63132d1e691c3c36
-
SHA1
411783c755d6ba9b406699605c5f2f2ec9ed297f
-
SHA256
7918606f0e9b7ced3185f1a355999767c0d474d59297e93c673213465b581a32
-
SHA512
ada695b17b48c7c86366fe7c0c6bb19a74f36fd939448651e15bed5616d8f76ffd0db37ebd4edbaad35daf4fc4c4ba9ae0c4e629c7e41943380f6b223ad25cbe
-
SSDEEP
6144:DklhLAcLZmgDLNRGbevYr77ZX9ijQbDgss9wV8alhrJVey6jbX:DqhL9mQmb/3RgjyDgss13X
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1032 7918606f0e9b7ced3185f1a355999767c0d474d59297e93c673213465b581a32.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1188 1032 7918606f0e9b7ced3185f1a355999767c0d474d59297e93c673213465b581a32.exe 79 PID 1032 wrote to memory of 1188 1032 7918606f0e9b7ced3185f1a355999767c0d474d59297e93c673213465b581a32.exe 79 PID 1032 wrote to memory of 1188 1032 7918606f0e9b7ced3185f1a355999767c0d474d59297e93c673213465b581a32.exe 79 PID 1032 wrote to memory of 1188 1032 7918606f0e9b7ced3185f1a355999767c0d474d59297e93c673213465b581a32.exe 79 PID 1032 wrote to memory of 1188 1032 7918606f0e9b7ced3185f1a355999767c0d474d59297e93c673213465b581a32.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\7918606f0e9b7ced3185f1a355999767c0d474d59297e93c673213465b581a32.exe"C:\Users\Admin\AppData\Local\Temp\7918606f0e9b7ced3185f1a355999767c0d474d59297e93c673213465b581a32.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\7918606f0e9b7ced3185f1a355999767c0d474d59297e93c673213465b581a32.exeC:\Users\Admin\AppData\Local\Temp\7918606f0e9b7ced3185f1a355999767c0d474d59297e93c673213465b581a32.exe2⤵PID:1188
-