Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 19:19
Static task
static1
Behavioral task
behavioral1
Sample
f3b3dba32ee85e427cbdad7935bf210be0e72043b03ce6f05d35bb6913675a10.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f3b3dba32ee85e427cbdad7935bf210be0e72043b03ce6f05d35bb6913675a10.exe
Resource
win10v2004-20221111-en
General
-
Target
f3b3dba32ee85e427cbdad7935bf210be0e72043b03ce6f05d35bb6913675a10.exe
-
Size
1.3MB
-
MD5
88b916a884e502518db8b91f8cf1b30e
-
SHA1
a429e4f1c695dde11d8fd71b8035e96c43ba5a7b
-
SHA256
f3b3dba32ee85e427cbdad7935bf210be0e72043b03ce6f05d35bb6913675a10
-
SHA512
bd4733589b568679458866a7a566190729d670298d5f73a0e8ecb73a3610bc3fda2069d3987a3dfc80b95cd0b8cecdb1734976089e8238b427d21665391f3478
-
SSDEEP
24576:LGjJZtAXaMb5YpCCNAfGU64giomYhXlZwVBhVS+JbIHICWKotTn+h:LGNZpbmfLRgioDXz+BhA3SvVnk
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4608 set thread context of 1484 4608 f3b3dba32ee85e427cbdad7935bf210be0e72043b03ce6f05d35bb6913675a10.exe 83 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1484 f3b3dba32ee85e427cbdad7935bf210be0e72043b03ce6f05d35bb6913675a10.exe 1484 f3b3dba32ee85e427cbdad7935bf210be0e72043b03ce6f05d35bb6913675a10.exe 1484 f3b3dba32ee85e427cbdad7935bf210be0e72043b03ce6f05d35bb6913675a10.exe 1484 f3b3dba32ee85e427cbdad7935bf210be0e72043b03ce6f05d35bb6913675a10.exe 1484 f3b3dba32ee85e427cbdad7935bf210be0e72043b03ce6f05d35bb6913675a10.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4608 wrote to memory of 1484 4608 f3b3dba32ee85e427cbdad7935bf210be0e72043b03ce6f05d35bb6913675a10.exe 83 PID 4608 wrote to memory of 1484 4608 f3b3dba32ee85e427cbdad7935bf210be0e72043b03ce6f05d35bb6913675a10.exe 83 PID 4608 wrote to memory of 1484 4608 f3b3dba32ee85e427cbdad7935bf210be0e72043b03ce6f05d35bb6913675a10.exe 83 PID 4608 wrote to memory of 1484 4608 f3b3dba32ee85e427cbdad7935bf210be0e72043b03ce6f05d35bb6913675a10.exe 83 PID 4608 wrote to memory of 1484 4608 f3b3dba32ee85e427cbdad7935bf210be0e72043b03ce6f05d35bb6913675a10.exe 83 PID 4608 wrote to memory of 1484 4608 f3b3dba32ee85e427cbdad7935bf210be0e72043b03ce6f05d35bb6913675a10.exe 83 PID 4608 wrote to memory of 1484 4608 f3b3dba32ee85e427cbdad7935bf210be0e72043b03ce6f05d35bb6913675a10.exe 83 PID 4608 wrote to memory of 1484 4608 f3b3dba32ee85e427cbdad7935bf210be0e72043b03ce6f05d35bb6913675a10.exe 83 PID 4608 wrote to memory of 1484 4608 f3b3dba32ee85e427cbdad7935bf210be0e72043b03ce6f05d35bb6913675a10.exe 83 PID 4608 wrote to memory of 1484 4608 f3b3dba32ee85e427cbdad7935bf210be0e72043b03ce6f05d35bb6913675a10.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3b3dba32ee85e427cbdad7935bf210be0e72043b03ce6f05d35bb6913675a10.exe"C:\Users\Admin\AppData\Local\Temp\f3b3dba32ee85e427cbdad7935bf210be0e72043b03ce6f05d35bb6913675a10.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\f3b3dba32ee85e427cbdad7935bf210be0e72043b03ce6f05d35bb6913675a10.exe
- Suspicious use of SetWindowsHookEx
PID:1484
-