Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
4s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 15:20
Static task
static1
Behavioral task
behavioral1
Sample
a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe
Resource
win10v2004-20221111-en
General
-
Target
a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe
-
Size
93KB
-
MD5
0eef91ce5ad9e7f6e1c25c681fb34586
-
SHA1
0b96596cee958d52c928a8e82e69ad15eaf8fc92
-
SHA256
a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f
-
SHA512
e08606e769c6c14177421fbe3e43ba479162ad8c5cf3a6248afc1da67f082d996314ed48ba8611e23494ba0a0994b9b807905fe5a5bb2332a426d80d9fb3c2b4
-
SSDEEP
1536:sADWm7KxPVuw7JU2epOu0KxAPDcOz1sBvHeUT1ANKLDBx:s+OHK4cOza5+UT2w
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 944 set thread context of 940 944 a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe 28 -
Program crash 1 IoCs
pid pid_target Process procid_target 652 1608 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 944 a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe 944 a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 944 wrote to memory of 940 944 a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe 28 PID 944 wrote to memory of 940 944 a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe 28 PID 944 wrote to memory of 940 944 a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe 28 PID 944 wrote to memory of 940 944 a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe 28 PID 944 wrote to memory of 940 944 a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe 28 PID 944 wrote to memory of 940 944 a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe 28 PID 944 wrote to memory of 940 944 a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe 28 PID 944 wrote to memory of 940 944 a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe 28 PID 944 wrote to memory of 940 944 a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe 28 PID 944 wrote to memory of 940 944 a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe 28 PID 940 wrote to memory of 1608 940 a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe 29 PID 940 wrote to memory of 1608 940 a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe 29 PID 940 wrote to memory of 1608 940 a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe 29 PID 940 wrote to memory of 1608 940 a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe 29 PID 940 wrote to memory of 1608 940 a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe 29 PID 940 wrote to memory of 1608 940 a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe 29 PID 940 wrote to memory of 1608 940 a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe 29 PID 940 wrote to memory of 1608 940 a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe 29 PID 940 wrote to memory of 1608 940 a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe 29 PID 1608 wrote to memory of 652 1608 explorer.exe 30 PID 1608 wrote to memory of 652 1608 explorer.exe 30 PID 1608 wrote to memory of 652 1608 explorer.exe 30 PID 1608 wrote to memory of 652 1608 explorer.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe"C:\Users\Admin\AppData\Local\Temp\a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe"C:\Users\Admin\AppData\Local\Temp\a47b360ae5c16ae70ba292f82897d9077618440ef68d30d2f63446da4d2e5b1f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 2324⤵
- Program crash
PID:652
-
-
-