Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
26s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 17:37
Behavioral task
behavioral1
Sample
b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe
Resource
win10v2004-20220812-en
General
-
Target
b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe
-
Size
182KB
-
MD5
817adf24110cf9b327502fd1a975aa4f
-
SHA1
20e4edda578ef07ca93845dc3743438d1055ee96
-
SHA256
b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b
-
SHA512
15a34964514f219bc7d50eae154e0ecfd9c751f23162647793d1e8157bea20ee3c1416a4c9aa3e4d520136df4861e5fcf8a6608bda5d1237d59cab3ce9324e71
-
SSDEEP
1536:rnllFL4xITdXk+IrFjzOkHQRIPqmY7/ae817RReqmkq11IuIwWzn:rRL4T+IrVKkHQmVY7yem7XmkEHWzn
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/328-60-0x0000000000400000-0x000000000047E000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 328 set thread context of 1380 328 b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe 27 PID 328 set thread context of 0 328 b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1380 b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe 1380 b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 328 b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 328 wrote to memory of 1380 328 b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe 27 PID 328 wrote to memory of 1380 328 b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe 27 PID 328 wrote to memory of 1380 328 b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe 27 PID 328 wrote to memory of 1380 328 b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe 27 PID 328 wrote to memory of 1380 328 b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe 27 PID 328 wrote to memory of 1380 328 b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe 27 PID 328 wrote to memory of 1380 328 b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe 27 PID 328 wrote to memory of 1380 328 b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe 27 PID 328 wrote to memory of 0 328 b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe PID 328 wrote to memory of 0 328 b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe PID 328 wrote to memory of 0 328 b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe PID 328 wrote to memory of 0 328 b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe PID 1380 wrote to memory of 1412 1380 b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe 13 PID 1380 wrote to memory of 1412 1380 b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe 13 PID 1380 wrote to memory of 1412 1380 b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe 13 PID 1380 wrote to memory of 1412 1380 b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe 13
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe"C:\Users\Admin\AppData\Local\Temp\b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Users\Admin\AppData\Local\Temp\b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe"C:\Users\Admin\AppData\Local\Temp\b923a62895669014b3d978f9313f3257aaf89b32a1b034ea5799c6390f35a89b.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1380
-
-