Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    29s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 11:20

General

  • Target

    f22360d1224515fa43d7b9dd8b647995118dafff01e087c0b6a09506c37d9957.exe

  • Size

    251KB

  • MD5

    42d28123a3342ec78b95a0ac2f44dc03

  • SHA1

    0208e3776ac4021fe3e36f5ee7a6519d61f20562

  • SHA256

    f22360d1224515fa43d7b9dd8b647995118dafff01e087c0b6a09506c37d9957

  • SHA512

    12891c893fa4018f33d4162049fcd8667db768194f665d67dc7c5530ce4cbc391f9e32f6cb4caf2550b1eed54517ec1e7e207555057b58099328468b1d7056d7

  • SSDEEP

    6144:45VAoJ+t3A/mahXi5fOMxd1QcypK9HuV8qzBWRpgUilbDbzR:4HAht3gm6y4MnSMYPzMRpgU4D

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f22360d1224515fa43d7b9dd8b647995118dafff01e087c0b6a09506c37d9957.exe
    "C:\Users\Admin\AppData\Local\Temp\f22360d1224515fa43d7b9dd8b647995118dafff01e087c0b6a09506c37d9957.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1336
    • \??\c:\users\admin\appdata\local\temp\f22360d1224515fa43d7b9dd8b647995118dafff01e087c0b6a09506c37d9957.exe
      "c:\users\admin\appdata\local\temp\f22360d1224515fa43d7b9dd8b647995118dafff01e087c0b6a09506c37d9957.exe"
      2⤵
        PID:1348

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1348-54-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/1348-55-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/1348-57-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/1348-58-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/1348-60-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/1348-63-0x0000000075F01000-0x0000000075F03000-memory.dmp

      Filesize

      8KB

    • memory/1348-64-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB