Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
23/09/2023, 05:40
Static task
static1
General
-
Target
c869f873cffa490551585e229c684b387dd0196420ff8d2a71f1fa727ea19c37.exe
-
Size
365KB
-
MD5
5716e7742ae9717cc7155066885967e6
-
SHA1
7d62223d33b15353ba1eda45ac556035f49c6337
-
SHA256
c869f873cffa490551585e229c684b387dd0196420ff8d2a71f1fa727ea19c37
-
SHA512
80d071b7c4d7126c76c0f34e166705340bfc1b299c54b2c422b8659a76334f5c25a7e5f47f0ec37ee20def2e25dd14028005c00078fac4300116041aac9b4c10
-
SSDEEP
6144:tj5frpxdonyq4zaG2u5AOCeKFz8Bb9o8DzG5JTYtEXCrnVUeDquqp:t9rp0/9u5Ye0gBxvKTuES5UeDquqp
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4936 set thread context of 4412 4936 c869f873cffa490551585e229c684b387dd0196420ff8d2a71f1fa727ea19c37.exe 88 -
Program crash 1 IoCs
pid pid_target Process procid_target 1000 4936 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4936 wrote to memory of 4412 4936 c869f873cffa490551585e229c684b387dd0196420ff8d2a71f1fa727ea19c37.exe 88 PID 4936 wrote to memory of 4412 4936 c869f873cffa490551585e229c684b387dd0196420ff8d2a71f1fa727ea19c37.exe 88 PID 4936 wrote to memory of 4412 4936 c869f873cffa490551585e229c684b387dd0196420ff8d2a71f1fa727ea19c37.exe 88 PID 4936 wrote to memory of 4412 4936 c869f873cffa490551585e229c684b387dd0196420ff8d2a71f1fa727ea19c37.exe 88 PID 4936 wrote to memory of 4412 4936 c869f873cffa490551585e229c684b387dd0196420ff8d2a71f1fa727ea19c37.exe 88 PID 4936 wrote to memory of 4412 4936 c869f873cffa490551585e229c684b387dd0196420ff8d2a71f1fa727ea19c37.exe 88 PID 4936 wrote to memory of 4412 4936 c869f873cffa490551585e229c684b387dd0196420ff8d2a71f1fa727ea19c37.exe 88 PID 4936 wrote to memory of 4412 4936 c869f873cffa490551585e229c684b387dd0196420ff8d2a71f1fa727ea19c37.exe 88 PID 4936 wrote to memory of 4412 4936 c869f873cffa490551585e229c684b387dd0196420ff8d2a71f1fa727ea19c37.exe 88 PID 4936 wrote to memory of 4412 4936 c869f873cffa490551585e229c684b387dd0196420ff8d2a71f1fa727ea19c37.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c869f873cffa490551585e229c684b387dd0196420ff8d2a71f1fa727ea19c37.exe"C:\Users\Admin\AppData\Local\Temp\c869f873cffa490551585e229c684b387dd0196420ff8d2a71f1fa727ea19c37.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:4412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4936 -s 2762⤵
- Program crash
PID:1000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4936 -ip 49361⤵PID:3948