Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 19:31
Behavioral task
behavioral1
Sample
d26dbf7d20c7ba411cb17a53d866726f3d490182a877b0802c01ad9944734b85.exe
Resource
win7-20220901-en
3 signatures
150 seconds
General
-
Target
d26dbf7d20c7ba411cb17a53d866726f3d490182a877b0802c01ad9944734b85.exe
-
Size
4.8MB
-
MD5
4ed37bc3cb635db8a1dc88639201a1b3
-
SHA1
edf37178b5fa0813fd1ac6668ac55d92a9643f73
-
SHA256
d26dbf7d20c7ba411cb17a53d866726f3d490182a877b0802c01ad9944734b85
-
SHA512
dd33e9ddf3d7c14e89e1912d2baf27af374369d1f5e5d9067cd97636a3eee474185d39002585a54262b9657eb1948dd3e2c6bfc6d3bc292cbc5762edf2209901
-
SSDEEP
98304:vvnuhJ3VlFR8f/4hC0Sj/aUi3Dv1CWBE3ZGdnAWf0/5XpcUW:3nmZ9Sf/p23Dv842Wf0Fe
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1352-58-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1352-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1352-60-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1352-62-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1352-64-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1352-66-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1352-68-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1352-70-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1352-72-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1352-74-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1352-76-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1352-78-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1352-80-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1352-86-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1352-84-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1352-88-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1352-90-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1352-92-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1352-94-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1352-96-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1352-98-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1352-100-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1352-102-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1352-104-0x0000000010000000-0x000000001003E000-memory.dmp upx -
resource yara_rule behavioral1/memory/1352-55-0x0000000000400000-0x0000000000F19000-memory.dmp vmprotect behavioral1/memory/1352-82-0x0000000000400000-0x0000000000F19000-memory.dmp vmprotect behavioral1/memory/1352-103-0x0000000000400000-0x0000000000F19000-memory.dmp vmprotect -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1352 d26dbf7d20c7ba411cb17a53d866726f3d490182a877b0802c01ad9944734b85.exe 1352 d26dbf7d20c7ba411cb17a53d866726f3d490182a877b0802c01ad9944734b85.exe 1352 d26dbf7d20c7ba411cb17a53d866726f3d490182a877b0802c01ad9944734b85.exe 1352 d26dbf7d20c7ba411cb17a53d866726f3d490182a877b0802c01ad9944734b85.exe