Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 20:01
Behavioral task
behavioral1
Sample
931b40556a39a4bb1d2608a120f454687a2dc67c507647625ad6c105f880d70a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
931b40556a39a4bb1d2608a120f454687a2dc67c507647625ad6c105f880d70a.exe
Resource
win10v2004-20220812-en
General
-
Target
931b40556a39a4bb1d2608a120f454687a2dc67c507647625ad6c105f880d70a.exe
-
Size
83KB
-
MD5
845183a0d4affb939e6636378c5349d0
-
SHA1
0bc40ac0822f1ef9d0b7854e249b665002e2c445
-
SHA256
931b40556a39a4bb1d2608a120f454687a2dc67c507647625ad6c105f880d70a
-
SHA512
4b19f4832793019a8b34d44570e8a67eeacbeec53fb010570c6efc9906edee051dc4b26c25d9a88d3f3dcc707d4ed395a21cad507d9583722c860a25ebb9c07b
-
SSDEEP
1536:/UtQgxhV/KqRxH75mGOLHf9RtrTxLPQEAKVAPObClQdwDDgagR97ZzPcsrHStHfv:stQg5xxbgGOTjFb9gDkzPcsrWfC9E
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1720-55-0x0000000000400000-0x0000000000439000-memory.dmp upx -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1720 931b40556a39a4bb1d2608a120f454687a2dc67c507647625ad6c105f880d70a.exe 1720 931b40556a39a4bb1d2608a120f454687a2dc67c507647625ad6c105f880d70a.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1720 931b40556a39a4bb1d2608a120f454687a2dc67c507647625ad6c105f880d70a.exe 1720 931b40556a39a4bb1d2608a120f454687a2dc67c507647625ad6c105f880d70a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\931b40556a39a4bb1d2608a120f454687a2dc67c507647625ad6c105f880d70a.exe"C:\Users\Admin\AppData\Local\Temp\931b40556a39a4bb1d2608a120f454687a2dc67c507647625ad6c105f880d70a.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1720