Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
189s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 11:51
Static task
static1
Behavioral task
behavioral1
Sample
d532641b36cace351fe14917d0f1c86dc749db9be697d6bb663d1687854667f1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d532641b36cace351fe14917d0f1c86dc749db9be697d6bb663d1687854667f1.exe
Resource
win10v2004-20221111-en
General
-
Target
d532641b36cace351fe14917d0f1c86dc749db9be697d6bb663d1687854667f1.exe
-
Size
1.3MB
-
MD5
ae7453aac697e2fc873bc13ee474843c
-
SHA1
de38889afc2edf81c0ad33c166d475d9ad78a288
-
SHA256
d532641b36cace351fe14917d0f1c86dc749db9be697d6bb663d1687854667f1
-
SHA512
16bcf0c73c7808a76f62844283d719af8ea26f32c7f031717a2f4ad8d6b2a4a44068cc49c01b4e835d6790ffeaf1a8d1d09eced81d13e9c9676197bb1d753358
-
SSDEEP
24576:brKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak7q:brKo4ZwCOnYjVmJPax
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1544 set thread context of 4912 1544 d532641b36cace351fe14917d0f1c86dc749db9be697d6bb663d1687854667f1.exe 84 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4912 d532641b36cace351fe14917d0f1c86dc749db9be697d6bb663d1687854667f1.exe 4912 d532641b36cace351fe14917d0f1c86dc749db9be697d6bb663d1687854667f1.exe 4912 d532641b36cace351fe14917d0f1c86dc749db9be697d6bb663d1687854667f1.exe 4912 d532641b36cace351fe14917d0f1c86dc749db9be697d6bb663d1687854667f1.exe 4912 d532641b36cace351fe14917d0f1c86dc749db9be697d6bb663d1687854667f1.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1544 wrote to memory of 4912 1544 d532641b36cace351fe14917d0f1c86dc749db9be697d6bb663d1687854667f1.exe 84 PID 1544 wrote to memory of 4912 1544 d532641b36cace351fe14917d0f1c86dc749db9be697d6bb663d1687854667f1.exe 84 PID 1544 wrote to memory of 4912 1544 d532641b36cace351fe14917d0f1c86dc749db9be697d6bb663d1687854667f1.exe 84 PID 1544 wrote to memory of 4912 1544 d532641b36cace351fe14917d0f1c86dc749db9be697d6bb663d1687854667f1.exe 84 PID 1544 wrote to memory of 4912 1544 d532641b36cace351fe14917d0f1c86dc749db9be697d6bb663d1687854667f1.exe 84 PID 1544 wrote to memory of 4912 1544 d532641b36cace351fe14917d0f1c86dc749db9be697d6bb663d1687854667f1.exe 84 PID 1544 wrote to memory of 4912 1544 d532641b36cace351fe14917d0f1c86dc749db9be697d6bb663d1687854667f1.exe 84 PID 1544 wrote to memory of 4912 1544 d532641b36cace351fe14917d0f1c86dc749db9be697d6bb663d1687854667f1.exe 84 PID 1544 wrote to memory of 4912 1544 d532641b36cace351fe14917d0f1c86dc749db9be697d6bb663d1687854667f1.exe 84 PID 1544 wrote to memory of 4912 1544 d532641b36cace351fe14917d0f1c86dc749db9be697d6bb663d1687854667f1.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d532641b36cace351fe14917d0f1c86dc749db9be697d6bb663d1687854667f1.exe"C:\Users\Admin\AppData\Local\Temp\d532641b36cace351fe14917d0f1c86dc749db9be697d6bb663d1687854667f1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\d532641b36cace351fe14917d0f1c86dc749db9be697d6bb663d1687854667f1.exe
- Suspicious use of SetWindowsHookEx
PID:4912
-