Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
30/09/2023, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
754765c486c0c006e9ce63a459374460_JC.exe
Resource
win7-20230831-en
3 signatures
150 seconds
General
-
Target
754765c486c0c006e9ce63a459374460_JC.exe
-
Size
364KB
-
MD5
754765c486c0c006e9ce63a459374460
-
SHA1
31b58e6a307040401d2a8670cbe9651526925ce0
-
SHA256
d4acc828084837a2a5c594bfc73a689f8426cecb8557c1d9905307049568a356
-
SHA512
6f6571e70dc751fcbb7cd3e4e0dd3195e4ed1b03f29062b3a7ac412655bc585b97315899438f28710ece8bc9e63866d71d69a7c6f62e3f494d92de2e385c9e34
-
SSDEEP
6144:GsXAxlt3fuPgyxhV5dAOVGJAXLwWwVDOIRjYkHiBAudbeWoPGCH:GFxltWT36qrIR8kHiBAudKnGCH
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2180 set thread context of 2216 2180 754765c486c0c006e9ce63a459374460_JC.exe 29 -
Program crash 2 IoCs
pid pid_target Process procid_target 2716 2180 WerFault.exe 28 2028 2216 WerFault.exe 29 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2216 2180 754765c486c0c006e9ce63a459374460_JC.exe 29 PID 2180 wrote to memory of 2216 2180 754765c486c0c006e9ce63a459374460_JC.exe 29 PID 2180 wrote to memory of 2216 2180 754765c486c0c006e9ce63a459374460_JC.exe 29 PID 2180 wrote to memory of 2216 2180 754765c486c0c006e9ce63a459374460_JC.exe 29 PID 2180 wrote to memory of 2216 2180 754765c486c0c006e9ce63a459374460_JC.exe 29 PID 2180 wrote to memory of 2216 2180 754765c486c0c006e9ce63a459374460_JC.exe 29 PID 2180 wrote to memory of 2216 2180 754765c486c0c006e9ce63a459374460_JC.exe 29 PID 2180 wrote to memory of 2216 2180 754765c486c0c006e9ce63a459374460_JC.exe 29 PID 2180 wrote to memory of 2216 2180 754765c486c0c006e9ce63a459374460_JC.exe 29 PID 2180 wrote to memory of 2216 2180 754765c486c0c006e9ce63a459374460_JC.exe 29 PID 2180 wrote to memory of 2216 2180 754765c486c0c006e9ce63a459374460_JC.exe 29 PID 2180 wrote to memory of 2216 2180 754765c486c0c006e9ce63a459374460_JC.exe 29 PID 2180 wrote to memory of 2216 2180 754765c486c0c006e9ce63a459374460_JC.exe 29 PID 2180 wrote to memory of 2216 2180 754765c486c0c006e9ce63a459374460_JC.exe 29 PID 2180 wrote to memory of 2716 2180 754765c486c0c006e9ce63a459374460_JC.exe 30 PID 2180 wrote to memory of 2716 2180 754765c486c0c006e9ce63a459374460_JC.exe 30 PID 2180 wrote to memory of 2716 2180 754765c486c0c006e9ce63a459374460_JC.exe 30 PID 2180 wrote to memory of 2716 2180 754765c486c0c006e9ce63a459374460_JC.exe 30 PID 2216 wrote to memory of 2028 2216 AppLaunch.exe 31 PID 2216 wrote to memory of 2028 2216 AppLaunch.exe 31 PID 2216 wrote to memory of 2028 2216 AppLaunch.exe 31 PID 2216 wrote to memory of 2028 2216 AppLaunch.exe 31 PID 2216 wrote to memory of 2028 2216 AppLaunch.exe 31 PID 2216 wrote to memory of 2028 2216 AppLaunch.exe 31 PID 2216 wrote to memory of 2028 2216 AppLaunch.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\754765c486c0c006e9ce63a459374460_JC.exe"C:\Users\Admin\AppData\Local\Temp\754765c486c0c006e9ce63a459374460_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 1963⤵
- Program crash
PID:2028
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 922⤵
- Program crash
PID:2716
-