Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 19:17
Static task
static1
Behavioral task
behavioral1
Sample
8ea6a97456bea0f1b4de1737218b4fac7d57e6f985dda2737b3661e4437051f5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8ea6a97456bea0f1b4de1737218b4fac7d57e6f985dda2737b3661e4437051f5.exe
Resource
win10v2004-20220812-en
General
-
Target
8ea6a97456bea0f1b4de1737218b4fac7d57e6f985dda2737b3661e4437051f5.exe
-
Size
276KB
-
MD5
ff719222cf7e68c21f63bc5ad1deb45a
-
SHA1
c1e585d497389922778fc2ce21d2bca6aaf21bd4
-
SHA256
8ea6a97456bea0f1b4de1737218b4fac7d57e6f985dda2737b3661e4437051f5
-
SHA512
959ca7e4891fdf6b844f32887dba154845df06b5f16d9325c6f06712fcda66e1bee830af0001ea13b9a8e60157d60ec97fd26202801c238f1dd9f1d4c4e959e4
-
SSDEEP
3072:Rztn5ymi8Eu11uZaLJbN2SQ3N7Do0JgT5SVtoaKGlD8yWC242UcdRCUqL0lAeYcb:R0bZsNZ
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1100 set thread context of 1724 1100 8ea6a97456bea0f1b4de1737218b4fac7d57e6f985dda2737b3661e4437051f5.exe 27 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1724 8ea6a97456bea0f1b4de1737218b4fac7d57e6f985dda2737b3661e4437051f5.exe 1724 8ea6a97456bea0f1b4de1737218b4fac7d57e6f985dda2737b3661e4437051f5.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1100 8ea6a97456bea0f1b4de1737218b4fac7d57e6f985dda2737b3661e4437051f5.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1100 wrote to memory of 1724 1100 8ea6a97456bea0f1b4de1737218b4fac7d57e6f985dda2737b3661e4437051f5.exe 27 PID 1100 wrote to memory of 1724 1100 8ea6a97456bea0f1b4de1737218b4fac7d57e6f985dda2737b3661e4437051f5.exe 27 PID 1100 wrote to memory of 1724 1100 8ea6a97456bea0f1b4de1737218b4fac7d57e6f985dda2737b3661e4437051f5.exe 27 PID 1100 wrote to memory of 1724 1100 8ea6a97456bea0f1b4de1737218b4fac7d57e6f985dda2737b3661e4437051f5.exe 27 PID 1100 wrote to memory of 1724 1100 8ea6a97456bea0f1b4de1737218b4fac7d57e6f985dda2737b3661e4437051f5.exe 27 PID 1100 wrote to memory of 1724 1100 8ea6a97456bea0f1b4de1737218b4fac7d57e6f985dda2737b3661e4437051f5.exe 27 PID 1100 wrote to memory of 1724 1100 8ea6a97456bea0f1b4de1737218b4fac7d57e6f985dda2737b3661e4437051f5.exe 27 PID 1100 wrote to memory of 1724 1100 8ea6a97456bea0f1b4de1737218b4fac7d57e6f985dda2737b3661e4437051f5.exe 27 PID 1724 wrote to memory of 1236 1724 8ea6a97456bea0f1b4de1737218b4fac7d57e6f985dda2737b3661e4437051f5.exe 20 PID 1724 wrote to memory of 1236 1724 8ea6a97456bea0f1b4de1737218b4fac7d57e6f985dda2737b3661e4437051f5.exe 20 PID 1724 wrote to memory of 1236 1724 8ea6a97456bea0f1b4de1737218b4fac7d57e6f985dda2737b3661e4437051f5.exe 20 PID 1724 wrote to memory of 1236 1724 8ea6a97456bea0f1b4de1737218b4fac7d57e6f985dda2737b3661e4437051f5.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\8ea6a97456bea0f1b4de1737218b4fac7d57e6f985dda2737b3661e4437051f5.exe"C:\Users\Admin\AppData\Local\Temp\8ea6a97456bea0f1b4de1737218b4fac7d57e6f985dda2737b3661e4437051f5.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\8ea6a97456bea0f1b4de1737218b4fac7d57e6f985dda2737b3661e4437051f5.exe"C:\Users\Admin\AppData\Local\Temp\8ea6a97456bea0f1b4de1737218b4fac7d57e6f985dda2737b3661e4437051f5.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1724
-
-