Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 12:59
Static task
static1
Behavioral task
behavioral1
Sample
fdf4f691c6d631257d4c770206de34d9e7730c99934a53e25fa8169cda3309bb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fdf4f691c6d631257d4c770206de34d9e7730c99934a53e25fa8169cda3309bb.exe
Resource
win10v2004-20220812-en
General
-
Target
fdf4f691c6d631257d4c770206de34d9e7730c99934a53e25fa8169cda3309bb.exe
-
Size
81KB
-
MD5
42ac5ae5361fd345f42521c3645cadc0
-
SHA1
14453d9c40913daeda0373c37f9d3e4410d8c9b1
-
SHA256
fdf4f691c6d631257d4c770206de34d9e7730c99934a53e25fa8169cda3309bb
-
SHA512
64d32c23638ae25ea5b8d778628a83c25ce10d14ced93869eb4cd2a3640d2b7a0cc4535841910ddd007def31182a2461d1e0e2e8f5b509d4587153c96ab175be
-
SSDEEP
1536:HzMbmB6BnyuO6zAuo/IXEN1bn0w5z9jug8FKMfgY:HzMbmcJOuCIXt88dgY
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\skype.dat" svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1756 fdf4f691c6d631257d4c770206de34d9e7730c99934a53e25fa8169cda3309bb.exe 1992 svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1756 fdf4f691c6d631257d4c770206de34d9e7730c99934a53e25fa8169cda3309bb.exe 1756 fdf4f691c6d631257d4c770206de34d9e7730c99934a53e25fa8169cda3309bb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdf4f691c6d631257d4c770206de34d9e7730c99934a53e25fa8169cda3309bb.exe"C:\Users\Admin\AppData\Local\Temp\fdf4f691c6d631257d4c770206de34d9e7730c99934a53e25fa8169cda3309bb.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: MapViewOfSection
PID:1756
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1992