Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
46s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
e403a506b99ebb0a93562b391d66037ca9a0cafa4eedf9934a1718a8caa966bf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e403a506b99ebb0a93562b391d66037ca9a0cafa4eedf9934a1718a8caa966bf.exe
Resource
win10v2004-20220812-en
General
-
Target
e403a506b99ebb0a93562b391d66037ca9a0cafa4eedf9934a1718a8caa966bf.exe
-
Size
108KB
-
MD5
a0ff068c02f7cc63f26e2c6b9e2fccbc
-
SHA1
a37ccef03fb5b49accef766badd2d040c6435a36
-
SHA256
e403a506b99ebb0a93562b391d66037ca9a0cafa4eedf9934a1718a8caa966bf
-
SHA512
fb97f2cf57484978cc60e2ab1b7f167e59a08dd552414f363ad5b1e872e8287e353bf70edee76202c12bf001e7f6ff0aa62806f19ff960737884935932c4df58
-
SSDEEP
3072:38m9qe6vopN20BC/wmuv3HDwK2lt/TTU1:/9qlAs/wmuvX2/TTU1
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1692 1768 WerFault.exe 26 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1768 e403a506b99ebb0a93562b391d66037ca9a0cafa4eedf9934a1718a8caa966bf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1692 1768 e403a506b99ebb0a93562b391d66037ca9a0cafa4eedf9934a1718a8caa966bf.exe 27 PID 1768 wrote to memory of 1692 1768 e403a506b99ebb0a93562b391d66037ca9a0cafa4eedf9934a1718a8caa966bf.exe 27 PID 1768 wrote to memory of 1692 1768 e403a506b99ebb0a93562b391d66037ca9a0cafa4eedf9934a1718a8caa966bf.exe 27 PID 1768 wrote to memory of 1692 1768 e403a506b99ebb0a93562b391d66037ca9a0cafa4eedf9934a1718a8caa966bf.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\e403a506b99ebb0a93562b391d66037ca9a0cafa4eedf9934a1718a8caa966bf.exe"C:\Users\Admin\AppData\Local\Temp\e403a506b99ebb0a93562b391d66037ca9a0cafa4eedf9934a1718a8caa966bf.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 1882⤵
- Program crash
PID:1692
-