Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2022, 05:29
Static task
static1
Behavioral task
behavioral1
Sample
cf6e6c0380b3c5f85f0c2510e5124a9779fe709a77461939f5b0afe02a0a5731.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cf6e6c0380b3c5f85f0c2510e5124a9779fe709a77461939f5b0afe02a0a5731.exe
Resource
win10v2004-20220812-en
General
-
Target
cf6e6c0380b3c5f85f0c2510e5124a9779fe709a77461939f5b0afe02a0a5731.exe
-
Size
1.3MB
-
MD5
aca6f968047e6373f978a235473cee64
-
SHA1
165fce0a9fc11583f7898b3d1bf3b41336bf038b
-
SHA256
cf6e6c0380b3c5f85f0c2510e5124a9779fe709a77461939f5b0afe02a0a5731
-
SHA512
529073ef8c44528877caf0d7564226bb5afff5d52fe2069e82fc9c252e568d510a72cc56b82ee27af80eb1762ae1a89a414977359f066682a4814358b6dc42ee
-
SSDEEP
24576:7rKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak:7rKo4ZwCOnYjVmJPa
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4932 set thread context of 3172 4932 cf6e6c0380b3c5f85f0c2510e5124a9779fe709a77461939f5b0afe02a0a5731.exe 80 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3172 cf6e6c0380b3c5f85f0c2510e5124a9779fe709a77461939f5b0afe02a0a5731.exe 3172 cf6e6c0380b3c5f85f0c2510e5124a9779fe709a77461939f5b0afe02a0a5731.exe 3172 cf6e6c0380b3c5f85f0c2510e5124a9779fe709a77461939f5b0afe02a0a5731.exe 3172 cf6e6c0380b3c5f85f0c2510e5124a9779fe709a77461939f5b0afe02a0a5731.exe 3172 cf6e6c0380b3c5f85f0c2510e5124a9779fe709a77461939f5b0afe02a0a5731.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4932 wrote to memory of 3172 4932 cf6e6c0380b3c5f85f0c2510e5124a9779fe709a77461939f5b0afe02a0a5731.exe 80 PID 4932 wrote to memory of 3172 4932 cf6e6c0380b3c5f85f0c2510e5124a9779fe709a77461939f5b0afe02a0a5731.exe 80 PID 4932 wrote to memory of 3172 4932 cf6e6c0380b3c5f85f0c2510e5124a9779fe709a77461939f5b0afe02a0a5731.exe 80 PID 4932 wrote to memory of 3172 4932 cf6e6c0380b3c5f85f0c2510e5124a9779fe709a77461939f5b0afe02a0a5731.exe 80 PID 4932 wrote to memory of 3172 4932 cf6e6c0380b3c5f85f0c2510e5124a9779fe709a77461939f5b0afe02a0a5731.exe 80 PID 4932 wrote to memory of 3172 4932 cf6e6c0380b3c5f85f0c2510e5124a9779fe709a77461939f5b0afe02a0a5731.exe 80 PID 4932 wrote to memory of 3172 4932 cf6e6c0380b3c5f85f0c2510e5124a9779fe709a77461939f5b0afe02a0a5731.exe 80 PID 4932 wrote to memory of 3172 4932 cf6e6c0380b3c5f85f0c2510e5124a9779fe709a77461939f5b0afe02a0a5731.exe 80 PID 4932 wrote to memory of 3172 4932 cf6e6c0380b3c5f85f0c2510e5124a9779fe709a77461939f5b0afe02a0a5731.exe 80 PID 4932 wrote to memory of 3172 4932 cf6e6c0380b3c5f85f0c2510e5124a9779fe709a77461939f5b0afe02a0a5731.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf6e6c0380b3c5f85f0c2510e5124a9779fe709a77461939f5b0afe02a0a5731.exe"C:\Users\Admin\AppData\Local\Temp\cf6e6c0380b3c5f85f0c2510e5124a9779fe709a77461939f5b0afe02a0a5731.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\cf6e6c0380b3c5f85f0c2510e5124a9779fe709a77461939f5b0afe02a0a5731.exe
- Suspicious use of SetWindowsHookEx
PID:3172
-