Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
20/08/2023, 21:13
Static task
static1
Behavioral task
behavioral1
Sample
96d8cbc79f3be5d70af8cb20c8b2349bbde28399cda4ae372f0157be3bb18129.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
96d8cbc79f3be5d70af8cb20c8b2349bbde28399cda4ae372f0157be3bb18129.exe
Resource
win10v2004-20230703-en
General
-
Target
96d8cbc79f3be5d70af8cb20c8b2349bbde28399cda4ae372f0157be3bb18129.exe
-
Size
2.3MB
-
MD5
e938935db1909a33473aad99b2c3b685
-
SHA1
a98ff67336da2f38676d18243c6a9be2758518b7
-
SHA256
96d8cbc79f3be5d70af8cb20c8b2349bbde28399cda4ae372f0157be3bb18129
-
SHA512
787b079585859efbf3452e50f31b79cb87ea7869b7862aad672cde9f0ee1f983d3bc284b28c56819653eeee32c587c88eeea59b446f835ce9c69494f54ad36d6
-
SSDEEP
24576:Es8jONh5DQwsJAyLVn3eody1VEYYUba3PwhQtLOEDbF4:NdEJt3eQwWYYUu3PaMxF4
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2516-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2516-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2516-58-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2516-56-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2516-60-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2516-62-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2516-64-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2516-66-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2516-70-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2516-68-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2516-76-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2516-74-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2516-72-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2516-78-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2516-80-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2516-84-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2516-87-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2516-82-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2516-89-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2516-92-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2516-98-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2516-96-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2516-94-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2516-99-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2516 96d8cbc79f3be5d70af8cb20c8b2349bbde28399cda4ae372f0157be3bb18129.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2516 96d8cbc79f3be5d70af8cb20c8b2349bbde28399cda4ae372f0157be3bb18129.exe 2516 96d8cbc79f3be5d70af8cb20c8b2349bbde28399cda4ae372f0157be3bb18129.exe 2516 96d8cbc79f3be5d70af8cb20c8b2349bbde28399cda4ae372f0157be3bb18129.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96d8cbc79f3be5d70af8cb20c8b2349bbde28399cda4ae372f0157be3bb18129.exe"C:\Users\Admin\AppData\Local\Temp\96d8cbc79f3be5d70af8cb20c8b2349bbde28399cda4ae372f0157be3bb18129.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2516