Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 18:19
Static task
static1
Behavioral task
behavioral1
Sample
5fd821eb71a91956694148132aea0503cc14186ae36a4fe45685242ac74e8662.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5fd821eb71a91956694148132aea0503cc14186ae36a4fe45685242ac74e8662.exe
Resource
win10v2004-20221111-en
General
-
Target
5fd821eb71a91956694148132aea0503cc14186ae36a4fe45685242ac74e8662.exe
-
Size
1.6MB
-
MD5
1986b28dd4ed9b5c6a14fb303e4d3e44
-
SHA1
3d73b6420bcf40fe1d9d4f43b0073cbb133b3b42
-
SHA256
5fd821eb71a91956694148132aea0503cc14186ae36a4fe45685242ac74e8662
-
SHA512
f4ac5de2cc6fb3a3388e63ee3e2368abd1b1192270f21e0c734b9096533f420a326f73b24ca617fe439291dac67dd959c49a96b87fea56e9211ab5c1f396235e
-
SSDEEP
3072:1K0xSoMD4x73lMY8l3C4ymojama7enhhiD5gRLn9NEphvyAzN4VNVOTtAkwkioPF:1JwU0nhQlLcj4Y2Rym
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1452 set thread context of 4524 1452 5fd821eb71a91956694148132aea0503cc14186ae36a4fe45685242ac74e8662.exe 83 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1452 5fd821eb71a91956694148132aea0503cc14186ae36a4fe45685242ac74e8662.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1452 wrote to memory of 4524 1452 5fd821eb71a91956694148132aea0503cc14186ae36a4fe45685242ac74e8662.exe 83 PID 1452 wrote to memory of 4524 1452 5fd821eb71a91956694148132aea0503cc14186ae36a4fe45685242ac74e8662.exe 83 PID 1452 wrote to memory of 4524 1452 5fd821eb71a91956694148132aea0503cc14186ae36a4fe45685242ac74e8662.exe 83 PID 1452 wrote to memory of 4524 1452 5fd821eb71a91956694148132aea0503cc14186ae36a4fe45685242ac74e8662.exe 83 PID 1452 wrote to memory of 4524 1452 5fd821eb71a91956694148132aea0503cc14186ae36a4fe45685242ac74e8662.exe 83 PID 1452 wrote to memory of 4524 1452 5fd821eb71a91956694148132aea0503cc14186ae36a4fe45685242ac74e8662.exe 83 PID 1452 wrote to memory of 4524 1452 5fd821eb71a91956694148132aea0503cc14186ae36a4fe45685242ac74e8662.exe 83 PID 1452 wrote to memory of 4524 1452 5fd821eb71a91956694148132aea0503cc14186ae36a4fe45685242ac74e8662.exe 83 PID 1452 wrote to memory of 4524 1452 5fd821eb71a91956694148132aea0503cc14186ae36a4fe45685242ac74e8662.exe 83 PID 1452 wrote to memory of 4524 1452 5fd821eb71a91956694148132aea0503cc14186ae36a4fe45685242ac74e8662.exe 83 PID 1452 wrote to memory of 4524 1452 5fd821eb71a91956694148132aea0503cc14186ae36a4fe45685242ac74e8662.exe 83 PID 1452 wrote to memory of 4524 1452 5fd821eb71a91956694148132aea0503cc14186ae36a4fe45685242ac74e8662.exe 83 PID 1452 wrote to memory of 4524 1452 5fd821eb71a91956694148132aea0503cc14186ae36a4fe45685242ac74e8662.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fd821eb71a91956694148132aea0503cc14186ae36a4fe45685242ac74e8662.exe"C:\Users\Admin\AppData\Local\Temp\5fd821eb71a91956694148132aea0503cc14186ae36a4fe45685242ac74e8662.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\5fd821eb71a91956694148132aea0503cc14186ae36a4fe45685242ac74e8662.exe"C:\Users\Admin\AppData\Local\Temp\5fd821eb71a91956694148132aea0503cc14186ae36a4fe45685242ac74e8662.exe"2⤵PID:4524
-