Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2022, 01:19
Static task
static1
Behavioral task
behavioral1
Sample
a09176bcc0ef175e6d2451a4d2029c988c044bb872703abfcf8d008c15be3023.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a09176bcc0ef175e6d2451a4d2029c988c044bb872703abfcf8d008c15be3023.exe
Resource
win10v2004-20220901-en
General
-
Target
a09176bcc0ef175e6d2451a4d2029c988c044bb872703abfcf8d008c15be3023.exe
-
Size
1.2MB
-
MD5
0e2ca285dbcd0b2eb9bd916571cf26db
-
SHA1
56be842c1d9d3e898570b36e12c75d35045eb39f
-
SHA256
a09176bcc0ef175e6d2451a4d2029c988c044bb872703abfcf8d008c15be3023
-
SHA512
59b5ae2d9126e104fb0f9766109b5ef972a3e13f9e310a108a7469bc4401c1e6c2a9eb6de043132e235aef17f3a706148784fbce4a99a0e05a4ef600979a3662
-
SSDEEP
24576:mpEdL1+miBQxprjUQftJLpV1VnaLcpI4Ig+JxMP:EEqmvxD3pRaLcZIg+8
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 848 set thread context of 4724 848 a09176bcc0ef175e6d2451a4d2029c988c044bb872703abfcf8d008c15be3023.exe 82 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4724 a09176bcc0ef175e6d2451a4d2029c988c044bb872703abfcf8d008c15be3023.exe 4724 a09176bcc0ef175e6d2451a4d2029c988c044bb872703abfcf8d008c15be3023.exe 4724 a09176bcc0ef175e6d2451a4d2029c988c044bb872703abfcf8d008c15be3023.exe 4724 a09176bcc0ef175e6d2451a4d2029c988c044bb872703abfcf8d008c15be3023.exe 4724 a09176bcc0ef175e6d2451a4d2029c988c044bb872703abfcf8d008c15be3023.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 848 wrote to memory of 4724 848 a09176bcc0ef175e6d2451a4d2029c988c044bb872703abfcf8d008c15be3023.exe 82 PID 848 wrote to memory of 4724 848 a09176bcc0ef175e6d2451a4d2029c988c044bb872703abfcf8d008c15be3023.exe 82 PID 848 wrote to memory of 4724 848 a09176bcc0ef175e6d2451a4d2029c988c044bb872703abfcf8d008c15be3023.exe 82 PID 848 wrote to memory of 4724 848 a09176bcc0ef175e6d2451a4d2029c988c044bb872703abfcf8d008c15be3023.exe 82 PID 848 wrote to memory of 4724 848 a09176bcc0ef175e6d2451a4d2029c988c044bb872703abfcf8d008c15be3023.exe 82 PID 848 wrote to memory of 4724 848 a09176bcc0ef175e6d2451a4d2029c988c044bb872703abfcf8d008c15be3023.exe 82 PID 848 wrote to memory of 4724 848 a09176bcc0ef175e6d2451a4d2029c988c044bb872703abfcf8d008c15be3023.exe 82 PID 848 wrote to memory of 4724 848 a09176bcc0ef175e6d2451a4d2029c988c044bb872703abfcf8d008c15be3023.exe 82 PID 848 wrote to memory of 4724 848 a09176bcc0ef175e6d2451a4d2029c988c044bb872703abfcf8d008c15be3023.exe 82 PID 848 wrote to memory of 4724 848 a09176bcc0ef175e6d2451a4d2029c988c044bb872703abfcf8d008c15be3023.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\a09176bcc0ef175e6d2451a4d2029c988c044bb872703abfcf8d008c15be3023.exe"C:\Users\Admin\AppData\Local\Temp\a09176bcc0ef175e6d2451a4d2029c988c044bb872703abfcf8d008c15be3023.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\a09176bcc0ef175e6d2451a4d2029c988c044bb872703abfcf8d008c15be3023.exe"C:\Users\Admin\AppData\Local\Temp\a09176bcc0ef175e6d2451a4d2029c988c044bb872703abfcf8d008c15be3023.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:4724
-