Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 09:54
Static task
static1
Behavioral task
behavioral1
Sample
d1a1799a633a1872200c943b4d887658e1c5278bb676ad8dcd93211e103c2090.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d1a1799a633a1872200c943b4d887658e1c5278bb676ad8dcd93211e103c2090.exe
Resource
win10v2004-20220812-en
General
-
Target
d1a1799a633a1872200c943b4d887658e1c5278bb676ad8dcd93211e103c2090.exe
-
Size
525KB
-
MD5
834969504988ea4588b3e75fee74b6f8
-
SHA1
c67922d3e95f09a9774436a1efc3366304827972
-
SHA256
d1a1799a633a1872200c943b4d887658e1c5278bb676ad8dcd93211e103c2090
-
SHA512
7585b0c5f97bafcb69da23239d20690be0805a12cae485dbd33bb25418d3aec11ec1ad1d7f46893c29ecb174af69535a487484497856d49b67ddfa7382b4303b
-
SSDEEP
12288:k2ZoMjQUkb/tS/g71OGddJugf7PrOj6K0s0:dJjhkb/tSqndwk7PcJG
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1992 1760 d1a1799a633a1872200c943b4d887658e1c5278bb676ad8dcd93211e103c2090.exe 28 PID 1760 wrote to memory of 1992 1760 d1a1799a633a1872200c943b4d887658e1c5278bb676ad8dcd93211e103c2090.exe 28 PID 1760 wrote to memory of 1992 1760 d1a1799a633a1872200c943b4d887658e1c5278bb676ad8dcd93211e103c2090.exe 28 PID 1760 wrote to memory of 1992 1760 d1a1799a633a1872200c943b4d887658e1c5278bb676ad8dcd93211e103c2090.exe 28 PID 1760 wrote to memory of 480 1760 d1a1799a633a1872200c943b4d887658e1c5278bb676ad8dcd93211e103c2090.exe 29 PID 1760 wrote to memory of 480 1760 d1a1799a633a1872200c943b4d887658e1c5278bb676ad8dcd93211e103c2090.exe 29 PID 1760 wrote to memory of 480 1760 d1a1799a633a1872200c943b4d887658e1c5278bb676ad8dcd93211e103c2090.exe 29 PID 1760 wrote to memory of 480 1760 d1a1799a633a1872200c943b4d887658e1c5278bb676ad8dcd93211e103c2090.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1a1799a633a1872200c943b4d887658e1c5278bb676ad8dcd93211e103c2090.exe"C:\Users\Admin\AppData\Local\Temp\d1a1799a633a1872200c943b4d887658e1c5278bb676ad8dcd93211e103c2090.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\d1a1799a633a1872200c943b4d887658e1c5278bb676ad8dcd93211e103c2090.exestart2⤵PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\d1a1799a633a1872200c943b4d887658e1c5278bb676ad8dcd93211e103c2090.exewatch2⤵PID:480
-