Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02/09/2023, 13:35
Behavioral task
behavioral1
Sample
8b57cb190283e573b858ac04de95744e997fabe7012a0c2ffc4704131afbbf99.exe
Resource
win7-20230831-en
4 signatures
150 seconds
General
-
Target
8b57cb190283e573b858ac04de95744e997fabe7012a0c2ffc4704131afbbf99.exe
-
Size
10.7MB
-
MD5
634349fc4afeaaab1e051cd4c4d0dcbe
-
SHA1
a9a29d573d28d191d40588e94067f766ced02a71
-
SHA256
8b57cb190283e573b858ac04de95744e997fabe7012a0c2ffc4704131afbbf99
-
SHA512
8d1b383bc41999628ef475be444f429ef38e05a91da18c9ec3ca16e562dd7dcd208c0b21af89bc560b9a64f199adefef7ea8d66097bbec56bbe688ecc99b0020
-
SSDEEP
196608:9yn9Q6Qfx86hAq7jDNhWVz36YJVRiFXwXw9Jzdm3W33/33W33X3J3d3rfFaENA+4:9S9Q6sx8CfDNhWJ36Yt/MENAv
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3056-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3056-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3056-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3056-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3056-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3056-52-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3056-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3056-54-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3056-56-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3056-60-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3056-62-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3056-64-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3056-66-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3056-68-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3056-72-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3056-75-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3056-78-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3056-81-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3056-84-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3056-87-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3056-90-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3056-93-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3056-95-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3056-96-0x0000000010000000-0x000000001003E000-memory.dmp upx -
resource yara_rule behavioral1/memory/3056-6-0x0000000000400000-0x000000000189D000-memory.dmp vmprotect behavioral1/memory/3056-58-0x0000000000400000-0x000000000189D000-memory.dmp vmprotect behavioral1/memory/3056-97-0x0000000000400000-0x000000000189D000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3056 8b57cb190283e573b858ac04de95744e997fabe7012a0c2ffc4704131afbbf99.exe 3056 8b57cb190283e573b858ac04de95744e997fabe7012a0c2ffc4704131afbbf99.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3056 8b57cb190283e573b858ac04de95744e997fabe7012a0c2ffc4704131afbbf99.exe 3056 8b57cb190283e573b858ac04de95744e997fabe7012a0c2ffc4704131afbbf99.exe 3056 8b57cb190283e573b858ac04de95744e997fabe7012a0c2ffc4704131afbbf99.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b57cb190283e573b858ac04de95744e997fabe7012a0c2ffc4704131afbbf99.exe"C:\Users\Admin\AppData\Local\Temp\8b57cb190283e573b858ac04de95744e997fabe7012a0c2ffc4704131afbbf99.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3056