Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
27s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 10:40
Behavioral task
behavioral1
Sample
c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe
Resource
win10v2004-20220812-en
General
-
Target
c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe
-
Size
79KB
-
MD5
2ba53f058e07cfe467ff7250256df977
-
SHA1
8f12b76e9d8e2815cd56dafbb286c621eeb1f142
-
SHA256
c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92
-
SHA512
2a8c800884e939cc7d594897725becbda6fbbe3ea9962b1f6665eba75e25ac144140af81cc5c2e4fd0c355d253990da1a16383dca8d2e9297301df35d83bebbf
-
SSDEEP
1536:W2IZM93et87VXjhNZ/Fb2x6KY4G2H6d9fY03JZFU:jIZWe4hNlC8KYL2aHfLrU
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 908 set thread context of 1932 908 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 27 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1932 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 1932 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 908 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 908 wrote to memory of 1932 908 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 27 PID 908 wrote to memory of 1932 908 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 27 PID 908 wrote to memory of 1932 908 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 27 PID 908 wrote to memory of 1932 908 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 27 PID 908 wrote to memory of 1932 908 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 27 PID 908 wrote to memory of 1932 908 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 27 PID 908 wrote to memory of 1932 908 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 27 PID 908 wrote to memory of 1932 908 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 27 PID 1932 wrote to memory of 1300 1932 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 14 PID 1932 wrote to memory of 1300 1932 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 14 PID 1932 wrote to memory of 1300 1932 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 14 PID 1932 wrote to memory of 1300 1932 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 14
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe"C:\Users\Admin\AppData\Local\Temp\c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Local\Temp\c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exeC:\Users\Admin\AppData\Local\Temp\c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1932
-
-