Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2023, 18:40
Behavioral task
behavioral1
Sample
5412c7d15a97e91eb4795bf2106bf64ff1c6bbf35bd78432e84f46e5b6090c5b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5412c7d15a97e91eb4795bf2106bf64ff1c6bbf35bd78432e84f46e5b6090c5b.exe
Resource
win10v2004-20230831-en
General
-
Target
5412c7d15a97e91eb4795bf2106bf64ff1c6bbf35bd78432e84f46e5b6090c5b.exe
-
Size
2.8MB
-
MD5
aa4fdd128aca3a4ba67d5bd3b81b8aee
-
SHA1
4a45b0d8adcf9e2392af91b39e5d84492d633a41
-
SHA256
5412c7d15a97e91eb4795bf2106bf64ff1c6bbf35bd78432e84f46e5b6090c5b
-
SHA512
74ead0af801978638bd9c97d0a770394db8a8a9724197d6b66425c913a1ebc19608b35f46939bc67fcde1690aa56e36acf4421deacf84ba77ba6117c581b21e1
-
SSDEEP
49152:yATl736HlE0HWLGip2Wd9GR9NdyXBZV34CjH3juOVtDbgWEteX2Frhz2e:Lxb0HWCe2WLGRTuBZV3r73SOVtgWEtea
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5068-0-0x0000000000400000-0x0000000000D7E000-memory.dmp upx behavioral2/memory/5068-1-0x0000000000400000-0x0000000000D7E000-memory.dmp upx behavioral2/memory/5068-2-0x0000000000400000-0x0000000000D7E000-memory.dmp upx behavioral2/memory/5068-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5068-5-0x0000000000400000-0x0000000000D7E000-memory.dmp upx behavioral2/memory/5068-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5068-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5068-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5068-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5068-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5068-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5068-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5068-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5068-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5068-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5068-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5068-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5068-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5068-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5068-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5068-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5068-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5068-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5068-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5068-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5068-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5068-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5068-48-0x0000000000400000-0x0000000000D7E000-memory.dmp upx behavioral2/memory/5068-49-0x0000000000400000-0x0000000000D7E000-memory.dmp upx behavioral2/memory/5068-50-0x0000000000400000-0x0000000000D7E000-memory.dmp upx behavioral2/memory/5068-51-0x0000000000400000-0x0000000000D7E000-memory.dmp upx behavioral2/memory/5068-52-0x0000000000400000-0x0000000000D7E000-memory.dmp upx behavioral2/memory/5068-53-0x0000000000400000-0x0000000000D7E000-memory.dmp upx behavioral2/memory/5068-54-0x0000000000400000-0x0000000000D7E000-memory.dmp upx behavioral2/memory/5068-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5068-56-0x0000000000400000-0x0000000000D7E000-memory.dmp upx behavioral2/memory/5068-57-0x0000000000400000-0x0000000000D7E000-memory.dmp upx behavioral2/memory/5068-58-0x0000000000400000-0x0000000000D7E000-memory.dmp upx behavioral2/memory/5068-59-0x0000000000400000-0x0000000000D7E000-memory.dmp upx behavioral2/memory/5068-60-0x0000000000400000-0x0000000000D7E000-memory.dmp upx behavioral2/memory/5068-61-0x0000000000400000-0x0000000000D7E000-memory.dmp upx behavioral2/memory/5068-62-0x0000000000400000-0x0000000000D7E000-memory.dmp upx behavioral2/memory/5068-63-0x0000000000400000-0x0000000000D7E000-memory.dmp upx behavioral2/memory/5068-64-0x0000000000400000-0x0000000000D7E000-memory.dmp upx behavioral2/memory/5068-65-0x0000000000400000-0x0000000000D7E000-memory.dmp upx behavioral2/memory/5068-66-0x0000000000400000-0x0000000000D7E000-memory.dmp upx behavioral2/memory/5068-67-0x0000000000400000-0x0000000000D7E000-memory.dmp upx behavioral2/memory/5068-68-0x0000000000400000-0x0000000000D7E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5068 5412c7d15a97e91eb4795bf2106bf64ff1c6bbf35bd78432e84f46e5b6090c5b.exe 5068 5412c7d15a97e91eb4795bf2106bf64ff1c6bbf35bd78432e84f46e5b6090c5b.exe 5068 5412c7d15a97e91eb4795bf2106bf64ff1c6bbf35bd78432e84f46e5b6090c5b.exe