Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
41s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 11:01
Static task
static1
Behavioral task
behavioral1
Sample
9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe
Resource
win10v2004-20220812-en
General
-
Target
9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe
-
Size
104KB
-
MD5
15e562adff087d9a1d6728db1a7dfe2c
-
SHA1
26381b934871de765a56040492c39a27a20662c0
-
SHA256
9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097
-
SHA512
1e05f735bc7ad15087bd577b272ebd5619f21adf429266c8ec4327265ef295537ae86b247c7a318273b2b8378e8016cf0171ff96280c4c9a018e031961af2352
-
SSDEEP
1536:nyUTWif8HmhBt9w2L18uSISpTJLD6u0zxnuRDCEXBdKW9C/fLFRgcfd:yUjf19w2LiuzSLizxWD3PKW9CLFy
Malware Config
Signatures
-
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\amurpm.dll 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe File opened for modification C:\Windows\SysWOW64\userinit.exe 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe File opened for modification C:\Windows\SysWOW64\ntxeed.dll 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 960 set thread context of 2024 960 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 28 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 960 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 960 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 960 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 960 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2024 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 960 wrote to memory of 2024 960 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 28 PID 960 wrote to memory of 2024 960 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 28 PID 960 wrote to memory of 2024 960 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 28 PID 960 wrote to memory of 2024 960 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 28 PID 960 wrote to memory of 2024 960 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 28 PID 960 wrote to memory of 2024 960 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 28 PID 960 wrote to memory of 2024 960 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 28 PID 960 wrote to memory of 2024 960 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 28 PID 960 wrote to memory of 2024 960 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 28 PID 960 wrote to memory of 2024 960 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 28 PID 960 wrote to memory of 2024 960 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe"C:\Users\Admin\AppData\Local\Temp\9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe2⤵
- Suspicious use of UnmapMainImage
PID:2024
-