Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2023, 23:59
Static task
static1
Behavioral task
behavioral1
Sample
c59cf5dff2fe44615580d20a8892bda51f75442c8049c164bc5c9477fc5c9415.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c59cf5dff2fe44615580d20a8892bda51f75442c8049c164bc5c9477fc5c9415.exe
Resource
win10v2004-20230915-en
General
-
Target
c59cf5dff2fe44615580d20a8892bda51f75442c8049c164bc5c9477fc5c9415.exe
-
Size
3.6MB
-
MD5
13bfdc6dbfa3a1cf7e429571e15bb40b
-
SHA1
7f60ef798eda903671285f0cad204af8dc2d4f70
-
SHA256
c59cf5dff2fe44615580d20a8892bda51f75442c8049c164bc5c9477fc5c9415
-
SHA512
8e2f8763e6899fd759c1a62e9a75edd50f5493c8c7725b78267d8a1bafd60ce0b4255e7237ec1e33f6648fc83602799906e319319503d2215b1d65a1152fedff
-
SSDEEP
49152:URqTUMp8ww3BaaCXIW1qAXwe/r+j9ViHvx+s8KuqGaX0ToIBAUZLYqL:i34lXIy9XweDe90P6JBAUZL7L
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5108-0-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5108-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5108-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5108-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5108-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5108-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5108-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5108-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5108-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5108-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5108-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5108-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5108-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5108-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5108-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5108-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5108-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5108-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5108-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5108-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5108-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5108-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5108-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5108-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5108-44-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4900 5108 WerFault.exe 80 -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5108 c59cf5dff2fe44615580d20a8892bda51f75442c8049c164bc5c9477fc5c9415.exe 5108 c59cf5dff2fe44615580d20a8892bda51f75442c8049c164bc5c9477fc5c9415.exe 5108 c59cf5dff2fe44615580d20a8892bda51f75442c8049c164bc5c9477fc5c9415.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c59cf5dff2fe44615580d20a8892bda51f75442c8049c164bc5c9477fc5c9415.exe"C:\Users\Admin\AppData\Local\Temp\c59cf5dff2fe44615580d20a8892bda51f75442c8049c164bc5c9477fc5c9415.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:5108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 10122⤵
- Program crash
PID:4900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5108 -ip 51081⤵PID:2808