Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
295s -
max time network
321s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 01:51
Static task
static1
Behavioral task
behavioral1
Sample
89bcef8a8c565c40fba0f3a78345410324455de48f218023ab1186f465fdc2b4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
89bcef8a8c565c40fba0f3a78345410324455de48f218023ab1186f465fdc2b4.exe
Resource
win10v2004-20221111-en
General
-
Target
89bcef8a8c565c40fba0f3a78345410324455de48f218023ab1186f465fdc2b4.exe
-
Size
284KB
-
MD5
0b47294f05f30ea08acecf30cc8fcfca
-
SHA1
17987a237843137ed1a33c062982aa3703302433
-
SHA256
89bcef8a8c565c40fba0f3a78345410324455de48f218023ab1186f465fdc2b4
-
SHA512
8e5b90ce19f176f46033ce2be9252e652755c5d32761169e1b19a5efc8211c5cfe87e980c9ce1b930c24bc8ce537ca3e4bdceab4d74ff6b894b3dfccb3433f53
-
SSDEEP
6144:QaP/gZ90JpU28YMWTHSX1Nb+lPRyqHV2yJAZlj+hIzv/1:3/gI62dMW7m+F3HV2SA7v/1
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3764 set thread context of 2252 3764 89bcef8a8c565c40fba0f3a78345410324455de48f218023ab1186f465fdc2b4.exe 81 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3764 wrote to memory of 2252 3764 89bcef8a8c565c40fba0f3a78345410324455de48f218023ab1186f465fdc2b4.exe 81 PID 3764 wrote to memory of 2252 3764 89bcef8a8c565c40fba0f3a78345410324455de48f218023ab1186f465fdc2b4.exe 81 PID 3764 wrote to memory of 2252 3764 89bcef8a8c565c40fba0f3a78345410324455de48f218023ab1186f465fdc2b4.exe 81 PID 3764 wrote to memory of 2252 3764 89bcef8a8c565c40fba0f3a78345410324455de48f218023ab1186f465fdc2b4.exe 81 PID 3764 wrote to memory of 2252 3764 89bcef8a8c565c40fba0f3a78345410324455de48f218023ab1186f465fdc2b4.exe 81 PID 3764 wrote to memory of 2252 3764 89bcef8a8c565c40fba0f3a78345410324455de48f218023ab1186f465fdc2b4.exe 81 PID 3764 wrote to memory of 2252 3764 89bcef8a8c565c40fba0f3a78345410324455de48f218023ab1186f465fdc2b4.exe 81 PID 3764 wrote to memory of 2252 3764 89bcef8a8c565c40fba0f3a78345410324455de48f218023ab1186f465fdc2b4.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\89bcef8a8c565c40fba0f3a78345410324455de48f218023ab1186f465fdc2b4.exe"C:\Users\Admin\AppData\Local\Temp\89bcef8a8c565c40fba0f3a78345410324455de48f218023ab1186f465fdc2b4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\89bcef8a8c565c40fba0f3a78345410324455de48f218023ab1186f465fdc2b4.exe"C:\Users\Admin\AppData\Local\Temp\89bcef8a8c565c40fba0f3a78345410324455de48f218023ab1186f465fdc2b4.exe"2⤵PID:2252
-