Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 14:10
Static task
static1
Behavioral task
behavioral1
Sample
60bf68cf135d18365b7f918e51d10bff09ae5079429f6ab92ba40eb08eb55201.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
60bf68cf135d18365b7f918e51d10bff09ae5079429f6ab92ba40eb08eb55201.exe
Resource
win10v2004-20221111-en
General
-
Target
60bf68cf135d18365b7f918e51d10bff09ae5079429f6ab92ba40eb08eb55201.exe
-
Size
61KB
-
MD5
7402831a9a4bc916c3791dc44f18ca3f
-
SHA1
221ae615e3d51acebfd5ae1ed55069abcf13f4ea
-
SHA256
60bf68cf135d18365b7f918e51d10bff09ae5079429f6ab92ba40eb08eb55201
-
SHA512
997405cd3f879f12e46ce762a1b1a39532970d0f5a0f391b67f267caf882ee455e3aab41e22282db997fc350cf3fd033ef21c5466d2bd9d1ff4395cec0691255
-
SSDEEP
1536:82WMz/aXYGIVTgVgeG3MCLrIME5AkC2vV/:PuKvFrlCt
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zoetjj4t9z4.exe 60bf68cf135d18365b7f918e51d10bff09ae5079429f6ab92ba40eb08eb55201.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zoetjj4t9z4.exe 60bf68cf135d18365b7f918e51d10bff09ae5079429f6ab92ba40eb08eb55201.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1108 set thread context of 1124 1108 60bf68cf135d18365b7f918e51d10bff09ae5079429f6ab92ba40eb08eb55201.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1124 60bf68cf135d18365b7f918e51d10bff09ae5079429f6ab92ba40eb08eb55201.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1108 wrote to memory of 1124 1108 60bf68cf135d18365b7f918e51d10bff09ae5079429f6ab92ba40eb08eb55201.exe 28 PID 1108 wrote to memory of 1124 1108 60bf68cf135d18365b7f918e51d10bff09ae5079429f6ab92ba40eb08eb55201.exe 28 PID 1108 wrote to memory of 1124 1108 60bf68cf135d18365b7f918e51d10bff09ae5079429f6ab92ba40eb08eb55201.exe 28 PID 1108 wrote to memory of 1124 1108 60bf68cf135d18365b7f918e51d10bff09ae5079429f6ab92ba40eb08eb55201.exe 28 PID 1108 wrote to memory of 1124 1108 60bf68cf135d18365b7f918e51d10bff09ae5079429f6ab92ba40eb08eb55201.exe 28 PID 1108 wrote to memory of 1124 1108 60bf68cf135d18365b7f918e51d10bff09ae5079429f6ab92ba40eb08eb55201.exe 28 PID 1124 wrote to memory of 1272 1124 60bf68cf135d18365b7f918e51d10bff09ae5079429f6ab92ba40eb08eb55201.exe 15 PID 1124 wrote to memory of 1272 1124 60bf68cf135d18365b7f918e51d10bff09ae5079429f6ab92ba40eb08eb55201.exe 15 PID 1124 wrote to memory of 1272 1124 60bf68cf135d18365b7f918e51d10bff09ae5079429f6ab92ba40eb08eb55201.exe 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\60bf68cf135d18365b7f918e51d10bff09ae5079429f6ab92ba40eb08eb55201.exe"C:\Users\Admin\AppData\Local\Temp\60bf68cf135d18365b7f918e51d10bff09ae5079429f6ab92ba40eb08eb55201.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\60bf68cf135d18365b7f918e51d10bff09ae5079429f6ab92ba40eb08eb55201.exe"C:\Users\Admin\AppData\Local\Temp\60bf68cf135d18365b7f918e51d10bff09ae5079429f6ab92ba40eb08eb55201.exe"3⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1124
-
-