Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
25s -
max time network
55s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 10:15
Static task
static1
Behavioral task
behavioral1
Sample
437867575e36e4d93db86466f2ebdd81be81fd5a015d98ea2e98d4e4bbe039fc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
437867575e36e4d93db86466f2ebdd81be81fd5a015d98ea2e98d4e4bbe039fc.exe
Resource
win10v2004-20220901-en
General
-
Target
437867575e36e4d93db86466f2ebdd81be81fd5a015d98ea2e98d4e4bbe039fc.exe
-
Size
529KB
-
MD5
8ea0edf5427cc223ac20a4520b7345f7
-
SHA1
53261c40fd47669c96f2d9990f28915f24475eee
-
SHA256
437867575e36e4d93db86466f2ebdd81be81fd5a015d98ea2e98d4e4bbe039fc
-
SHA512
a98229c0277f7397daf8de5903e5ca00f3f5ada3a27f41c3122014e7bb00ac55694714ceefb9e7b70650ded2465a84d8b811db0d77ca4919fd7762293a5bc3ac
-
SSDEEP
12288:N2ZUb2Kyuh7ep3BN1hcoMw4aTpCT/6e0Wdi:SUb2w7yRJr4aTY/F9i
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1216 wrote to memory of 1292 1216 437867575e36e4d93db86466f2ebdd81be81fd5a015d98ea2e98d4e4bbe039fc.exe 28 PID 1216 wrote to memory of 1292 1216 437867575e36e4d93db86466f2ebdd81be81fd5a015d98ea2e98d4e4bbe039fc.exe 28 PID 1216 wrote to memory of 1292 1216 437867575e36e4d93db86466f2ebdd81be81fd5a015d98ea2e98d4e4bbe039fc.exe 28 PID 1216 wrote to memory of 1292 1216 437867575e36e4d93db86466f2ebdd81be81fd5a015d98ea2e98d4e4bbe039fc.exe 28 PID 1216 wrote to memory of 2044 1216 437867575e36e4d93db86466f2ebdd81be81fd5a015d98ea2e98d4e4bbe039fc.exe 29 PID 1216 wrote to memory of 2044 1216 437867575e36e4d93db86466f2ebdd81be81fd5a015d98ea2e98d4e4bbe039fc.exe 29 PID 1216 wrote to memory of 2044 1216 437867575e36e4d93db86466f2ebdd81be81fd5a015d98ea2e98d4e4bbe039fc.exe 29 PID 1216 wrote to memory of 2044 1216 437867575e36e4d93db86466f2ebdd81be81fd5a015d98ea2e98d4e4bbe039fc.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\437867575e36e4d93db86466f2ebdd81be81fd5a015d98ea2e98d4e4bbe039fc.exe"C:\Users\Admin\AppData\Local\Temp\437867575e36e4d93db86466f2ebdd81be81fd5a015d98ea2e98d4e4bbe039fc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\437867575e36e4d93db86466f2ebdd81be81fd5a015d98ea2e98d4e4bbe039fc.exestart2⤵PID:1292
-
-
C:\Users\Admin\AppData\Local\Temp\437867575e36e4d93db86466f2ebdd81be81fd5a015d98ea2e98d4e4bbe039fc.exewatch2⤵PID:2044
-