Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
47s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 23:51
Behavioral task
behavioral1
Sample
d5afb3e9112ac395e4d5b3307f4704e4e49a10b969a56dcae37531f67ab6b9f1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d5afb3e9112ac395e4d5b3307f4704e4e49a10b969a56dcae37531f67ab6b9f1.exe
Resource
win10v2004-20220812-en
General
-
Target
d5afb3e9112ac395e4d5b3307f4704e4e49a10b969a56dcae37531f67ab6b9f1.exe
-
Size
1.4MB
-
MD5
c61e0777df0a4ad4122f77ec5c6e108f
-
SHA1
2fbbdfa95920575e87a4a64ceab3f69c3dac6a0d
-
SHA256
d5afb3e9112ac395e4d5b3307f4704e4e49a10b969a56dcae37531f67ab6b9f1
-
SHA512
65fcaefdcc18995c76de414f6e1a19e650dc15351e2be8e9ce4fc11fa18d43f4a9f1d7afdb92bb87424a8f15ceb2a40f24168443ee0cb6c8ac9511352caf0f10
-
SSDEEP
24576:K37uVlbcJihE22v8NpMJO+BvkEKll3HcAJB3vWDwx2AHdSNMbCMFQ8z:K3yVqJih12UNp8alppJZO84ydSNMbC6
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1288-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-58-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-60-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-62-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-64-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-66-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-70-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-74-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-80-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-78-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-76-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-72-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-68-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-84-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-82-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-86-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-94-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-92-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-90-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-88-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-98-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-96-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-100-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-102-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1288-101-0x0000000000400000-0x0000000000753000-memory.dmp upx behavioral1/memory/1288-103-0x0000000000400000-0x0000000000753000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1288 d5afb3e9112ac395e4d5b3307f4704e4e49a10b969a56dcae37531f67ab6b9f1.exe 1288 d5afb3e9112ac395e4d5b3307f4704e4e49a10b969a56dcae37531f67ab6b9f1.exe 1288 d5afb3e9112ac395e4d5b3307f4704e4e49a10b969a56dcae37531f67ab6b9f1.exe