Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2023, 20:57
Static task
static1
Behavioral task
behavioral1
Sample
12d0a25ff848295cb292791889d1ff117de7c95adbc5cf7f4d666216e2ab495a.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
12d0a25ff848295cb292791889d1ff117de7c95adbc5cf7f4d666216e2ab495a.exe
Resource
win10v2004-20230703-en
General
-
Target
12d0a25ff848295cb292791889d1ff117de7c95adbc5cf7f4d666216e2ab495a.exe
-
Size
4.7MB
-
MD5
03a9ab49481700ca5158490a28207352
-
SHA1
9c9d69ec83a462ecaff20237ce6a8d2abecf7565
-
SHA256
12d0a25ff848295cb292791889d1ff117de7c95adbc5cf7f4d666216e2ab495a
-
SHA512
07965112399cee02c2d94d009d7bfa7af60e291be133c287b6e88d14c1f907862fccc5e416f05cf4073e6df2755c0f589be9a9400b28224a9ebbb087a80025c5
-
SSDEEP
98304:FzYQI5ti+0KDBqE6NYmnTvUUM1cBx1ZcJ0ztrxNNgkG:FJ+0+JNNc1ZrLWkG
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4060-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4060-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4060-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4060-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4060-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4060-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4060-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4060-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4060-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4060-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4060-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4060-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4060-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4060-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4060-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4060-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4060-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4060-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4060-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4060-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4060-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4060-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4060-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4060-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4060-50-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1676 4060 WerFault.exe 81 -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4060 12d0a25ff848295cb292791889d1ff117de7c95adbc5cf7f4d666216e2ab495a.exe 4060 12d0a25ff848295cb292791889d1ff117de7c95adbc5cf7f4d666216e2ab495a.exe 4060 12d0a25ff848295cb292791889d1ff117de7c95adbc5cf7f4d666216e2ab495a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12d0a25ff848295cb292791889d1ff117de7c95adbc5cf7f4d666216e2ab495a.exe"C:\Users\Admin\AppData\Local\Temp\12d0a25ff848295cb292791889d1ff117de7c95adbc5cf7f4d666216e2ab495a.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:4060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4060 -s 7922⤵
- Program crash
PID:1676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4060 -ip 40601⤵PID:656