Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
175s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 10:40
Behavioral task
behavioral1
Sample
c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe
Resource
win10v2004-20220812-en
General
-
Target
c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe
-
Size
79KB
-
MD5
2ba53f058e07cfe467ff7250256df977
-
SHA1
8f12b76e9d8e2815cd56dafbb286c621eeb1f142
-
SHA256
c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92
-
SHA512
2a8c800884e939cc7d594897725becbda6fbbe3ea9962b1f6665eba75e25ac144140af81cc5c2e4fd0c355d253990da1a16383dca8d2e9297301df35d83bebbf
-
SSDEEP
1536:W2IZM93et87VXjhNZ/Fb2x6KY4G2H6d9fY03JZFU:jIZWe4hNlC8KYL2aHfLrU
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1684 set thread context of 4928 1684 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 79 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4928 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 4928 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 4928 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 4928 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1684 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1684 wrote to memory of 4928 1684 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 79 PID 1684 wrote to memory of 4928 1684 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 79 PID 1684 wrote to memory of 4928 1684 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 79 PID 1684 wrote to memory of 4928 1684 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 79 PID 1684 wrote to memory of 4928 1684 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 79 PID 1684 wrote to memory of 4928 1684 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 79 PID 1684 wrote to memory of 4928 1684 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 79 PID 4928 wrote to memory of 2152 4928 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 52 PID 4928 wrote to memory of 2152 4928 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 52 PID 4928 wrote to memory of 2152 4928 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 52 PID 4928 wrote to memory of 2152 4928 c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe 52
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe"C:\Users\Admin\AppData\Local\Temp\c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exeC:\Users\Admin\AppData\Local\Temp\c68d9819dc05b7a0824cf434426799666e46827ff8f1970a5d7d4cdbc6817d92.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4928
-
-