Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
19/09/2023, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
3 signatures
150 seconds
General
-
Target
file.exe
-
Size
1.1MB
-
MD5
543558e885727bbaf6704714a60a7363
-
SHA1
d04f58d99bb3a5ba9339a8189f34165663ec3b39
-
SHA256
f097b87b3bcf5a7babd611978b998b3600a66522375116acfaff00a2c90ea3cd
-
SHA512
f39d00eaa8ef788f97825f065a2579bd597e2734c2fc459830ba52bf937a97d28552750211a129a644c69528457395afba93c3900383bbd95801cfd0f47c6adf
-
SSDEEP
12288:clse+N2dA1IY9i4ytPrJx5ZVfV5TjzBTVyh43IubL50nCoY5c7SzdLCAeO:qse02dA1h9i4ytvV/3dDdc7SgA/
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2064 set thread context of 1696 2064 file.exe 30 -
Program crash 2 IoCs
pid pid_target Process procid_target 2080 2064 WerFault.exe 27 2096 1696 WerFault.exe 30 -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2880 2064 file.exe 29 PID 2064 wrote to memory of 2880 2064 file.exe 29 PID 2064 wrote to memory of 2880 2064 file.exe 29 PID 2064 wrote to memory of 2880 2064 file.exe 29 PID 2064 wrote to memory of 2880 2064 file.exe 29 PID 2064 wrote to memory of 2880 2064 file.exe 29 PID 2064 wrote to memory of 2880 2064 file.exe 29 PID 2064 wrote to memory of 1696 2064 file.exe 30 PID 2064 wrote to memory of 1696 2064 file.exe 30 PID 2064 wrote to memory of 1696 2064 file.exe 30 PID 2064 wrote to memory of 1696 2064 file.exe 30 PID 2064 wrote to memory of 1696 2064 file.exe 30 PID 2064 wrote to memory of 1696 2064 file.exe 30 PID 2064 wrote to memory of 1696 2064 file.exe 30 PID 2064 wrote to memory of 1696 2064 file.exe 30 PID 2064 wrote to memory of 1696 2064 file.exe 30 PID 2064 wrote to memory of 1696 2064 file.exe 30 PID 2064 wrote to memory of 1696 2064 file.exe 30 PID 2064 wrote to memory of 1696 2064 file.exe 30 PID 2064 wrote to memory of 1696 2064 file.exe 30 PID 2064 wrote to memory of 1696 2064 file.exe 30 PID 2064 wrote to memory of 2080 2064 file.exe 31 PID 2064 wrote to memory of 2080 2064 file.exe 31 PID 2064 wrote to memory of 2080 2064 file.exe 31 PID 2064 wrote to memory of 2080 2064 file.exe 31 PID 1696 wrote to memory of 2096 1696 AppLaunch.exe 32 PID 1696 wrote to memory of 2096 1696 AppLaunch.exe 32 PID 1696 wrote to memory of 2096 1696 AppLaunch.exe 32 PID 1696 wrote to memory of 2096 1696 AppLaunch.exe 32 PID 1696 wrote to memory of 2096 1696 AppLaunch.exe 32 PID 1696 wrote to memory of 2096 1696 AppLaunch.exe 32 PID 1696 wrote to memory of 2096 1696 AppLaunch.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2880
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 1963⤵
- Program crash
PID:2096
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 1002⤵
- Program crash
PID:2080
-