Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 14:18
Static task
static1
Behavioral task
behavioral1
Sample
747bb3f1794fc77299a184f1f856a9fae2157a639555d393bb3165b0df7cf366.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
747bb3f1794fc77299a184f1f856a9fae2157a639555d393bb3165b0df7cf366.exe
Resource
win10v2004-20220901-en
General
-
Target
747bb3f1794fc77299a184f1f856a9fae2157a639555d393bb3165b0df7cf366.exe
-
Size
77KB
-
MD5
a32bdb59c7b56ab224dfafa51b7823f0
-
SHA1
662c34e5f14a989222f218cd961acdbfa325fd36
-
SHA256
747bb3f1794fc77299a184f1f856a9fae2157a639555d393bb3165b0df7cf366
-
SHA512
7ba2bd2c79edce7cc1eea2125d4c6143557b98d4f0c7706956582c4212f99e49450d714b82342c7f361c63b3f018d6b05d64f02b9f579c25c033881013cfe7ff
-
SSDEEP
1536:TO+AZhCZFcsifjE0SJIB/6pCypfoe6WH/RgI:TO3ZhHsio0tBGCzoRB
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\kernel.dll 747bb3f1794fc77299a184f1f856a9fae2157a639555d393bb3165b0df7cf366.exe File created C:\Windows\kernel.dll 747bb3f1794fc77299a184f1f856a9fae2157a639555d393bb3165b0df7cf366.exe File created C:\Windows\svchost.exe 747bb3f1794fc77299a184f1f856a9fae2157a639555d393bb3165b0df7cf366.exe File opened for modification C:\Windows\svchost.exe 747bb3f1794fc77299a184f1f856a9fae2157a639555d393bb3165b0df7cf366.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1368 747bb3f1794fc77299a184f1f856a9fae2157a639555d393bb3165b0df7cf366.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 1368 wrote to memory of 1280 1368 747bb3f1794fc77299a184f1f856a9fae2157a639555d393bb3165b0df7cf366.exe 18
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\747bb3f1794fc77299a184f1f856a9fae2157a639555d393bb3165b0df7cf366.exe"C:\Users\Admin\AppData\Local\Temp\747bb3f1794fc77299a184f1f856a9fae2157a639555d393bb3165b0df7cf366.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1368
-