Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
34s -
max time network
37s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 08:27
Static task
static1
Behavioral task
behavioral1
Sample
b70ccf38de8ec366896c252b5d3e0d6c6f2ecccb2fd14ee92c050540b1c117c9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b70ccf38de8ec366896c252b5d3e0d6c6f2ecccb2fd14ee92c050540b1c117c9.exe
Resource
win10v2004-20221111-en
General
-
Target
b70ccf38de8ec366896c252b5d3e0d6c6f2ecccb2fd14ee92c050540b1c117c9.exe
-
Size
63KB
-
MD5
eda241f3ad2a2a2a2ad45cfd97024f3f
-
SHA1
4d95d8a492edf49dc99594c54231b728691ace3f
-
SHA256
b70ccf38de8ec366896c252b5d3e0d6c6f2ecccb2fd14ee92c050540b1c117c9
-
SHA512
91e5379b182ccc9088d634bf369d6f8294edc0d4c24aeb3cdcf3557c6082230efc9874a657ffe9001d095d4552cadf68b40d862b4ec32afdc0aa7485455061d0
-
SSDEEP
1536:jvVTskgK2lipAcfTguBeOJTmKrlDR+iimkyb:dWK2U7giTmKrxRimkK
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1328-58-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral1/memory/1328-62-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral1/memory/1328-61-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral1/memory/1328-63-0x0000000010000000-0x000000001000F000-memory.dmp upx -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1416 wrote to memory of 1328 1416 b70ccf38de8ec366896c252b5d3e0d6c6f2ecccb2fd14ee92c050540b1c117c9.exe 28 PID 1416 wrote to memory of 1328 1416 b70ccf38de8ec366896c252b5d3e0d6c6f2ecccb2fd14ee92c050540b1c117c9.exe 28 PID 1416 wrote to memory of 1328 1416 b70ccf38de8ec366896c252b5d3e0d6c6f2ecccb2fd14ee92c050540b1c117c9.exe 28 PID 1416 wrote to memory of 1328 1416 b70ccf38de8ec366896c252b5d3e0d6c6f2ecccb2fd14ee92c050540b1c117c9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b70ccf38de8ec366896c252b5d3e0d6c6f2ecccb2fd14ee92c050540b1c117c9.exe"C:\Users\Admin\AppData\Local\Temp\b70ccf38de8ec366896c252b5d3e0d6c6f2ecccb2fd14ee92c050540b1c117c9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\b70ccf38de8ec366896c252b5d3e0d6c6f2ecccb2fd14ee92c050540b1c117c9.exe?2⤵PID:1328
-