Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
57s -
max time network
103s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
fda1fbaac4198a29437655570e0d19319d8c8e4814ea562dd97d04555515cc12.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fda1fbaac4198a29437655570e0d19319d8c8e4814ea562dd97d04555515cc12.exe
Resource
win10v2004-20220812-en
General
-
Target
fda1fbaac4198a29437655570e0d19319d8c8e4814ea562dd97d04555515cc12.exe
-
Size
133KB
-
MD5
f05a9d7fdc01ed0e585b23bd99e5e87a
-
SHA1
612c9d1a08ebec1b7d58469dc1186db378261815
-
SHA256
fda1fbaac4198a29437655570e0d19319d8c8e4814ea562dd97d04555515cc12
-
SHA512
db6f40141aa356bc321adbac3d4d0b80a6192f84de6cedceb1a38b2796db0d2d7a636d117bf78c429a8143968a2f9f4c6aa6606b92970f9b36a29b0f012bfca0
-
SSDEEP
3072:TV3poz5tE5DPvfcLppd6irxoifphYSoA0GbhbhicqiXWc/G:inQbv0tpcSDY5A0Gbvicq9
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/620-57-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral1/memory/620-60-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral1/memory/620-61-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral1/memory/620-63-0x0000000010000000-0x000000001000F000-memory.dmp upx -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1736 wrote to memory of 620 1736 fda1fbaac4198a29437655570e0d19319d8c8e4814ea562dd97d04555515cc12.exe 28 PID 1736 wrote to memory of 620 1736 fda1fbaac4198a29437655570e0d19319d8c8e4814ea562dd97d04555515cc12.exe 28 PID 1736 wrote to memory of 620 1736 fda1fbaac4198a29437655570e0d19319d8c8e4814ea562dd97d04555515cc12.exe 28 PID 1736 wrote to memory of 620 1736 fda1fbaac4198a29437655570e0d19319d8c8e4814ea562dd97d04555515cc12.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fda1fbaac4198a29437655570e0d19319d8c8e4814ea562dd97d04555515cc12.exe"C:\Users\Admin\AppData\Local\Temp\fda1fbaac4198a29437655570e0d19319d8c8e4814ea562dd97d04555515cc12.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\fda1fbaac4198a29437655570e0d19319d8c8e4814ea562dd97d04555515cc12.exe?2⤵PID:620
-