Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2022, 19:57
Static task
static1
Behavioral task
behavioral1
Sample
43da26b78e3721554988e9342217f182a41e3bbb6cbab88a2a19140b5dc91f24.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
43da26b78e3721554988e9342217f182a41e3bbb6cbab88a2a19140b5dc91f24.exe
Resource
win10v2004-20220901-en
General
-
Target
43da26b78e3721554988e9342217f182a41e3bbb6cbab88a2a19140b5dc91f24.exe
-
Size
878KB
-
MD5
43baa89620f86b478a2a1a5ab0cf26b6
-
SHA1
b509c80c967004f89068f2fd71288745213922a5
-
SHA256
43da26b78e3721554988e9342217f182a41e3bbb6cbab88a2a19140b5dc91f24
-
SHA512
b5bbc5c483676378caf0924dbb49daf74138853f998d26ebdea9b481ec7bb8fdd260027d444bb595fead4087e7b0100be3ef1cfbe89ccadeae8969072aaa44f6
-
SSDEEP
24576:Gy6xKtQXsImJhl09rDZknOAXPlGYJoafCQRv7J+azdjnFN:j2K2XLmN09rNSfln/f5Rv7J+apjFN
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3548-134-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3548-141-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3548-145-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3548-147-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3548-155-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3548-153-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3548-151-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3548-157-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3548-149-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3548-159-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3548-143-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3548-139-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3548-161-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3548-163-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3548-138-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3548-136-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3548-170-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3548-172-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3548-168-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3548-166-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3548-137-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3548-174-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3548-176-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3548-178-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3548-180-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3548-182-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2592 3548 WerFault.exe 19 -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3548 43da26b78e3721554988e9342217f182a41e3bbb6cbab88a2a19140b5dc91f24.exe 3548 43da26b78e3721554988e9342217f182a41e3bbb6cbab88a2a19140b5dc91f24.exe 3548 43da26b78e3721554988e9342217f182a41e3bbb6cbab88a2a19140b5dc91f24.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\43da26b78e3721554988e9342217f182a41e3bbb6cbab88a2a19140b5dc91f24.exe"C:\Users\Admin\AppData\Local\Temp\43da26b78e3721554988e9342217f182a41e3bbb6cbab88a2a19140b5dc91f24.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:3548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 8162⤵
- Program crash
PID:2592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3548 -ip 35481⤵PID:5008