Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
7s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 06:58
Static task
static1
Behavioral task
behavioral1
Sample
bf5a2873f1e8437dd0c2d90142137a92f69f39c5f6408665150b1a02e3fd9d0e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bf5a2873f1e8437dd0c2d90142137a92f69f39c5f6408665150b1a02e3fd9d0e.exe
Resource
win10v2004-20220812-en
General
-
Target
bf5a2873f1e8437dd0c2d90142137a92f69f39c5f6408665150b1a02e3fd9d0e.exe
-
Size
120KB
-
MD5
5e4e6b8886e7ea58dfdfdd08f51d1317
-
SHA1
132d3e75f5ea3abe82ff75354458b5ba9aacf15b
-
SHA256
bf5a2873f1e8437dd0c2d90142137a92f69f39c5f6408665150b1a02e3fd9d0e
-
SHA512
a43046dd966fde42b57e6ea9b1332a7fd33a2e186b42f400b9870efdbdeb5dd0f091642d3a8ed1934691170f4611bc29e59abbc51996ba456fd89dc2b81c245d
-
SSDEEP
3072:HMjTG6EoI1kl0AngQWLVMDQjxultVWm3n1Z:s3EvVYkxultZFZ
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2032 set thread context of 1608 2032 bf5a2873f1e8437dd0c2d90142137a92f69f39c5f6408665150b1a02e3fd9d0e.exe 27 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2032 bf5a2873f1e8437dd0c2d90142137a92f69f39c5f6408665150b1a02e3fd9d0e.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1608 2032 bf5a2873f1e8437dd0c2d90142137a92f69f39c5f6408665150b1a02e3fd9d0e.exe 27 PID 2032 wrote to memory of 1608 2032 bf5a2873f1e8437dd0c2d90142137a92f69f39c5f6408665150b1a02e3fd9d0e.exe 27 PID 2032 wrote to memory of 1608 2032 bf5a2873f1e8437dd0c2d90142137a92f69f39c5f6408665150b1a02e3fd9d0e.exe 27 PID 2032 wrote to memory of 1608 2032 bf5a2873f1e8437dd0c2d90142137a92f69f39c5f6408665150b1a02e3fd9d0e.exe 27 PID 2032 wrote to memory of 1608 2032 bf5a2873f1e8437dd0c2d90142137a92f69f39c5f6408665150b1a02e3fd9d0e.exe 27 PID 2032 wrote to memory of 1608 2032 bf5a2873f1e8437dd0c2d90142137a92f69f39c5f6408665150b1a02e3fd9d0e.exe 27 PID 2032 wrote to memory of 1608 2032 bf5a2873f1e8437dd0c2d90142137a92f69f39c5f6408665150b1a02e3fd9d0e.exe 27 PID 2032 wrote to memory of 1608 2032 bf5a2873f1e8437dd0c2d90142137a92f69f39c5f6408665150b1a02e3fd9d0e.exe 27 PID 2032 wrote to memory of 1608 2032 bf5a2873f1e8437dd0c2d90142137a92f69f39c5f6408665150b1a02e3fd9d0e.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf5a2873f1e8437dd0c2d90142137a92f69f39c5f6408665150b1a02e3fd9d0e.exe"C:\Users\Admin\AppData\Local\Temp\bf5a2873f1e8437dd0c2d90142137a92f69f39c5f6408665150b1a02e3fd9d0e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\bf5a2873f1e8437dd0c2d90142137a92f69f39c5f6408665150b1a02e3fd9d0e.exeC:\Users\Admin\AppData\Local\Temp\bf5a2873f1e8437dd0c2d90142137a92f69f39c5f6408665150b1a02e3fd9d0e.exe2⤵PID:1608
-