Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
246s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 07:47
Static task
static1
Behavioral task
behavioral1
Sample
d86ee7c6971f879dcb00411104c8c98f17324e71cf70671ddb7d08573cb05450.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d86ee7c6971f879dcb00411104c8c98f17324e71cf70671ddb7d08573cb05450.exe
Resource
win10v2004-20220901-en
General
-
Target
d86ee7c6971f879dcb00411104c8c98f17324e71cf70671ddb7d08573cb05450.exe
-
Size
133KB
-
MD5
0a7165ada2e5135298ae0d4ca5bf4e45
-
SHA1
9b7f81a4a59bd94f3e8c7f28b5284ad423e6c236
-
SHA256
d86ee7c6971f879dcb00411104c8c98f17324e71cf70671ddb7d08573cb05450
-
SHA512
262349e6ba5aa4e6f5816cb7cf46126a419c09ffa27534a1961ddcf835d663647c5785ce6c1762983d64d9bb52ed26d9939cfa8022e425b7db7b77b9c3d4d4f6
-
SSDEEP
3072:9wXjC7Rwp2rDCq4SxRvKTWjn7NTF4ChyXWg/V:WOukvCqLfKTWjhF4Ye
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/520-57-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral1/memory/520-61-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral1/memory/520-60-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral1/memory/520-63-0x0000000010000000-0x000000001000F000-memory.dmp upx -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 628 wrote to memory of 520 628 d86ee7c6971f879dcb00411104c8c98f17324e71cf70671ddb7d08573cb05450.exe 28 PID 628 wrote to memory of 520 628 d86ee7c6971f879dcb00411104c8c98f17324e71cf70671ddb7d08573cb05450.exe 28 PID 628 wrote to memory of 520 628 d86ee7c6971f879dcb00411104c8c98f17324e71cf70671ddb7d08573cb05450.exe 28 PID 628 wrote to memory of 520 628 d86ee7c6971f879dcb00411104c8c98f17324e71cf70671ddb7d08573cb05450.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d86ee7c6971f879dcb00411104c8c98f17324e71cf70671ddb7d08573cb05450.exe"C:\Users\Admin\AppData\Local\Temp\d86ee7c6971f879dcb00411104c8c98f17324e71cf70671ddb7d08573cb05450.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\d86ee7c6971f879dcb00411104c8c98f17324e71cf70671ddb7d08573cb05450.exe?2⤵PID:520
-