Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2023, 10:03
Behavioral task
behavioral1
Sample
bdb8aa80f3ed7da44ae54a355823dd5f2dd9cb9d2645a8615612fa5e6b6066d1.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
bdb8aa80f3ed7da44ae54a355823dd5f2dd9cb9d2645a8615612fa5e6b6066d1.exe
Resource
win10v2004-20230703-en
General
-
Target
bdb8aa80f3ed7da44ae54a355823dd5f2dd9cb9d2645a8615612fa5e6b6066d1.exe
-
Size
489KB
-
MD5
62fae2308e1531f0f55da4808559427c
-
SHA1
de2eda1453881a71ca973eb9e410152a41b3bb5b
-
SHA256
bdb8aa80f3ed7da44ae54a355823dd5f2dd9cb9d2645a8615612fa5e6b6066d1
-
SHA512
0437dd29c233c2597681cd6665a7fb8bf4a6ccb07e5b52d3f100d5e1ed217441e1bf191a46d500e2aab768b6c566381cdbb98d15f607df946361907bca0c171d
-
SSDEEP
12288:aw7zJxo+Y8FNqhd5JrTcIlDFo4Y3SKBMQyD/E7Q:aw7rZ0hnoYT8Q
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4316-133-0x0000000000400000-0x0000000000526000-memory.dmp upx behavioral2/memory/4316-135-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4316-136-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4316-137-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4316-139-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4316-141-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4316-143-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4316-145-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4316-147-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4316-149-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4316-151-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4316-153-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4316-155-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4316-157-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4316-159-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4316-161-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4316-163-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4316-165-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4316-167-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4316-169-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4316-171-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4316-173-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4316-175-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4316-177-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4316-185-0x0000000000400000-0x0000000000526000-memory.dmp upx behavioral2/memory/4316-192-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4316-198-0x0000000000400000-0x0000000000526000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4316 bdb8aa80f3ed7da44ae54a355823dd5f2dd9cb9d2645a8615612fa5e6b6066d1.exe 4316 bdb8aa80f3ed7da44ae54a355823dd5f2dd9cb9d2645a8615612fa5e6b6066d1.exe 4316 bdb8aa80f3ed7da44ae54a355823dd5f2dd9cb9d2645a8615612fa5e6b6066d1.exe 4316 bdb8aa80f3ed7da44ae54a355823dd5f2dd9cb9d2645a8615612fa5e6b6066d1.exe 4316 bdb8aa80f3ed7da44ae54a355823dd5f2dd9cb9d2645a8615612fa5e6b6066d1.exe