Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
201s -
max time network
211s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 13:26
Static task
static1
Behavioral task
behavioral1
Sample
e4c14a0968deef1e9b9e448ca034a96ddbd40ebd797332833547422525703fe7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e4c14a0968deef1e9b9e448ca034a96ddbd40ebd797332833547422525703fe7.exe
Resource
win10v2004-20221111-en
General
-
Target
e4c14a0968deef1e9b9e448ca034a96ddbd40ebd797332833547422525703fe7.exe
-
Size
743KB
-
MD5
941ce6fc9203be9085d0d6485be47af2
-
SHA1
74f92dc1d46cb003f422cb9f7ab3a81fab43276f
-
SHA256
e4c14a0968deef1e9b9e448ca034a96ddbd40ebd797332833547422525703fe7
-
SHA512
fe3e261c91ee1184238eb45e08621dba6505380482b1617fdc4e95521d3473c81c4ad35b458d2717cde3389e8f548ecefb55deea8e06be03a135b88c3d030238
-
SSDEEP
12288:RIx6Co7YNQ/nBaWnBsPDqWOFINJc+yJUVjRydmKchOgU1B15VnIQjFzkpp:2wzwQ/BaWnBCqwLc++UVymxONrIQ+z
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2796 set thread context of 5024 2796 e4c14a0968deef1e9b9e448ca034a96ddbd40ebd797332833547422525703fe7.exe 82 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5024 e4c14a0968deef1e9b9e448ca034a96ddbd40ebd797332833547422525703fe7.exe 5024 e4c14a0968deef1e9b9e448ca034a96ddbd40ebd797332833547422525703fe7.exe 5024 e4c14a0968deef1e9b9e448ca034a96ddbd40ebd797332833547422525703fe7.exe 5024 e4c14a0968deef1e9b9e448ca034a96ddbd40ebd797332833547422525703fe7.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2796 e4c14a0968deef1e9b9e448ca034a96ddbd40ebd797332833547422525703fe7.exe 2796 e4c14a0968deef1e9b9e448ca034a96ddbd40ebd797332833547422525703fe7.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2796 wrote to memory of 5024 2796 e4c14a0968deef1e9b9e448ca034a96ddbd40ebd797332833547422525703fe7.exe 82 PID 2796 wrote to memory of 5024 2796 e4c14a0968deef1e9b9e448ca034a96ddbd40ebd797332833547422525703fe7.exe 82 PID 2796 wrote to memory of 5024 2796 e4c14a0968deef1e9b9e448ca034a96ddbd40ebd797332833547422525703fe7.exe 82 PID 2796 wrote to memory of 5024 2796 e4c14a0968deef1e9b9e448ca034a96ddbd40ebd797332833547422525703fe7.exe 82 PID 2796 wrote to memory of 5024 2796 e4c14a0968deef1e9b9e448ca034a96ddbd40ebd797332833547422525703fe7.exe 82 PID 2796 wrote to memory of 5024 2796 e4c14a0968deef1e9b9e448ca034a96ddbd40ebd797332833547422525703fe7.exe 82 PID 2796 wrote to memory of 5024 2796 e4c14a0968deef1e9b9e448ca034a96ddbd40ebd797332833547422525703fe7.exe 82 PID 5024 wrote to memory of 2644 5024 e4c14a0968deef1e9b9e448ca034a96ddbd40ebd797332833547422525703fe7.exe 41 PID 5024 wrote to memory of 2644 5024 e4c14a0968deef1e9b9e448ca034a96ddbd40ebd797332833547422525703fe7.exe 41 PID 5024 wrote to memory of 2644 5024 e4c14a0968deef1e9b9e448ca034a96ddbd40ebd797332833547422525703fe7.exe 41 PID 5024 wrote to memory of 2644 5024 e4c14a0968deef1e9b9e448ca034a96ddbd40ebd797332833547422525703fe7.exe 41
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\e4c14a0968deef1e9b9e448ca034a96ddbd40ebd797332833547422525703fe7.exe"C:\Users\Admin\AppData\Local\Temp\e4c14a0968deef1e9b9e448ca034a96ddbd40ebd797332833547422525703fe7.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\e4c14a0968deef1e9b9e448ca034a96ddbd40ebd797332833547422525703fe7.exe
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5024
-
-