Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
49s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
15/02/2023, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
93ec9cf64967ae7949104a8dbfad0645.exe
Resource
win7-20221111-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
93ec9cf64967ae7949104a8dbfad0645.exe
Resource
win10v2004-20220812-en
4 signatures
150 seconds
General
-
Target
93ec9cf64967ae7949104a8dbfad0645.exe
-
Size
606KB
-
MD5
93ec9cf64967ae7949104a8dbfad0645
-
SHA1
bc87fdcf955b50d8a14ca1313ab0dc0ba4fad464
-
SHA256
4e8729cec052302332f77edcfed6d5c7c8856dd9574afdae822f3c66d918e261
-
SHA512
c73b6575b873fcad8d015f2c3648062cc7d47b05ba5f7ef32e18ff4879082557f488686037f8dfe8cb36d8230b4e34693d5df56e27b3d6127977276292a1ffc1
-
SSDEEP
12288:b5EoeB2gIXaqRsQI4Fvf20482V9Ty8ZQvT811+dLBuIGxaD9Fqf24Yp:+oY25lxf2047TT5Qvg4dJGxaDSe4
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1160 set thread context of 572 1160 93ec9cf64967ae7949104a8dbfad0645.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 572 93ec9cf64967ae7949104a8dbfad0645.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1160 wrote to memory of 572 1160 93ec9cf64967ae7949104a8dbfad0645.exe 28 PID 1160 wrote to memory of 572 1160 93ec9cf64967ae7949104a8dbfad0645.exe 28 PID 1160 wrote to memory of 572 1160 93ec9cf64967ae7949104a8dbfad0645.exe 28 PID 1160 wrote to memory of 572 1160 93ec9cf64967ae7949104a8dbfad0645.exe 28 PID 1160 wrote to memory of 572 1160 93ec9cf64967ae7949104a8dbfad0645.exe 28 PID 1160 wrote to memory of 572 1160 93ec9cf64967ae7949104a8dbfad0645.exe 28 PID 1160 wrote to memory of 572 1160 93ec9cf64967ae7949104a8dbfad0645.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\93ec9cf64967ae7949104a8dbfad0645.exe"C:\Users\Admin\AppData\Local\Temp\93ec9cf64967ae7949104a8dbfad0645.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\93ec9cf64967ae7949104a8dbfad0645.exe"C:\Users\Admin\AppData\Local\Temp\93ec9cf64967ae7949104a8dbfad0645.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:572
-