Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2022, 16:41
Static task
static1
Behavioral task
behavioral1
Sample
106210d9528e8b955a557dfe33c227017e35761c345a0b7a745e2b3cc6ef1482.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
106210d9528e8b955a557dfe33c227017e35761c345a0b7a745e2b3cc6ef1482.exe
Resource
win10v2004-20220812-en
General
-
Target
106210d9528e8b955a557dfe33c227017e35761c345a0b7a745e2b3cc6ef1482.exe
-
Size
1.3MB
-
MD5
798f9196b421422cc2bdbd0518fe1def
-
SHA1
62c696ffb7afa21fabd8322e249291e63b0eb76b
-
SHA256
106210d9528e8b955a557dfe33c227017e35761c345a0b7a745e2b3cc6ef1482
-
SHA512
d21a812ba227b0ab41183c69bd22a91ddf7e0b66c04bc854a1d09cfb0a677d96a23c8ff3631d5415dc0c5f4ae111558d7b9ff81e6af9bb3521ea462a2458f2c4
-
SSDEEP
24576:7rKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakf:7rKo4ZwCOnYjVmJPaA
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4112 set thread context of 3136 4112 106210d9528e8b955a557dfe33c227017e35761c345a0b7a745e2b3cc6ef1482.exe 78 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3136 106210d9528e8b955a557dfe33c227017e35761c345a0b7a745e2b3cc6ef1482.exe 3136 106210d9528e8b955a557dfe33c227017e35761c345a0b7a745e2b3cc6ef1482.exe 3136 106210d9528e8b955a557dfe33c227017e35761c345a0b7a745e2b3cc6ef1482.exe 3136 106210d9528e8b955a557dfe33c227017e35761c345a0b7a745e2b3cc6ef1482.exe 3136 106210d9528e8b955a557dfe33c227017e35761c345a0b7a745e2b3cc6ef1482.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4112 wrote to memory of 3136 4112 106210d9528e8b955a557dfe33c227017e35761c345a0b7a745e2b3cc6ef1482.exe 78 PID 4112 wrote to memory of 3136 4112 106210d9528e8b955a557dfe33c227017e35761c345a0b7a745e2b3cc6ef1482.exe 78 PID 4112 wrote to memory of 3136 4112 106210d9528e8b955a557dfe33c227017e35761c345a0b7a745e2b3cc6ef1482.exe 78 PID 4112 wrote to memory of 3136 4112 106210d9528e8b955a557dfe33c227017e35761c345a0b7a745e2b3cc6ef1482.exe 78 PID 4112 wrote to memory of 3136 4112 106210d9528e8b955a557dfe33c227017e35761c345a0b7a745e2b3cc6ef1482.exe 78 PID 4112 wrote to memory of 3136 4112 106210d9528e8b955a557dfe33c227017e35761c345a0b7a745e2b3cc6ef1482.exe 78 PID 4112 wrote to memory of 3136 4112 106210d9528e8b955a557dfe33c227017e35761c345a0b7a745e2b3cc6ef1482.exe 78 PID 4112 wrote to memory of 3136 4112 106210d9528e8b955a557dfe33c227017e35761c345a0b7a745e2b3cc6ef1482.exe 78 PID 4112 wrote to memory of 3136 4112 106210d9528e8b955a557dfe33c227017e35761c345a0b7a745e2b3cc6ef1482.exe 78 PID 4112 wrote to memory of 3136 4112 106210d9528e8b955a557dfe33c227017e35761c345a0b7a745e2b3cc6ef1482.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\106210d9528e8b955a557dfe33c227017e35761c345a0b7a745e2b3cc6ef1482.exe"C:\Users\Admin\AppData\Local\Temp\106210d9528e8b955a557dfe33c227017e35761c345a0b7a745e2b3cc6ef1482.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\106210d9528e8b955a557dfe33c227017e35761c345a0b7a745e2b3cc6ef1482.exe
- Suspicious use of SetWindowsHookEx
PID:3136
-