Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
171s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 16:34
Static task
static1
Behavioral task
behavioral1
Sample
ZBL1211.exe
Resource
win7-20220812-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
ZBL1211.exe
Resource
win10v2004-20220812-en
3 signatures
150 seconds
General
-
Target
ZBL1211.exe
-
Size
1.0MB
-
MD5
28e5176f4c546fc69f0477016dc33bea
-
SHA1
5f6ec6d8733967005d30630c1363acb5680abdb1
-
SHA256
7e444455e23087f0c1e5dd1649bea3b6758f238c1192a8440069756be91c2f8f
-
SHA512
e43bb6530667e7bf22712f4c76f4cc1c440a9cbadbe2789e86838764cc00617ae023e50a2099b8f3d6a1c781ae686b06040bcd8ec705b9b0856bbab7900d7d29
-
SSDEEP
24576:5y6xUTMFEyW3NGk8rPjgyfNiD2YuXqdjO498U1NiFznHm:M2REyMUNrV/YCqdjOu/0zG
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3524-135-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3524-137-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3524-138-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3524-140-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3524-142-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3524-139-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3524-144-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3524-146-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3524-148-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3524-150-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3524-152-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3524-154-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3524-156-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3524-158-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3524-160-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3524-162-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3524-164-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3524-166-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3524-168-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3524-170-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3524-172-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3524-174-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3524-176-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3524-178-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3524-180-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3524-182-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 536 3524 WerFault.exe 77 -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3524 ZBL1211.exe 3524 ZBL1211.exe 3524 ZBL1211.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ZBL1211.exe"C:\Users\Admin\AppData\Local\Temp\ZBL1211.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:3524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 8162⤵
- Program crash
PID:536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3524 -ip 35241⤵PID:4244