Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2023, 20:27
Static task
static1
General
-
Target
a4aab090fe9593f9ce6469e80a0fcc74de01fe65f8d47417459cf3a20c1bbcfb.exe
-
Size
304KB
-
MD5
356e667de8d3677498fcfdd7b7bb9fda
-
SHA1
5e6c2a82f8a70a6a33f700b25efb2282ce90b204
-
SHA256
a4aab090fe9593f9ce6469e80a0fcc74de01fe65f8d47417459cf3a20c1bbcfb
-
SHA512
95a36ee9bb908c7305d9b2718a0b6757ea4c0e22728ad32c7257879566181f637dd545fd1d3a9dc7f04d695ebb77bcf15824e97fb1770b8ff94a9f2b7bc713b4
-
SSDEEP
6144:dB8dqnD2xsILYMOG1PiSt8IZBF3P6+HMJjyZ98s8/A22C8U5VWTRX8:dlD2xsILYqUSthOJj6amzCbITRX8
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3720 set thread context of 4220 3720 a4aab090fe9593f9ce6469e80a0fcc74de01fe65f8d47417459cf3a20c1bbcfb.exe 88 -
Program crash 1 IoCs
pid pid_target Process procid_target 4176 3720 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3720 wrote to memory of 4220 3720 a4aab090fe9593f9ce6469e80a0fcc74de01fe65f8d47417459cf3a20c1bbcfb.exe 88 PID 3720 wrote to memory of 4220 3720 a4aab090fe9593f9ce6469e80a0fcc74de01fe65f8d47417459cf3a20c1bbcfb.exe 88 PID 3720 wrote to memory of 4220 3720 a4aab090fe9593f9ce6469e80a0fcc74de01fe65f8d47417459cf3a20c1bbcfb.exe 88 PID 3720 wrote to memory of 4220 3720 a4aab090fe9593f9ce6469e80a0fcc74de01fe65f8d47417459cf3a20c1bbcfb.exe 88 PID 3720 wrote to memory of 4220 3720 a4aab090fe9593f9ce6469e80a0fcc74de01fe65f8d47417459cf3a20c1bbcfb.exe 88 PID 3720 wrote to memory of 4220 3720 a4aab090fe9593f9ce6469e80a0fcc74de01fe65f8d47417459cf3a20c1bbcfb.exe 88 PID 3720 wrote to memory of 4220 3720 a4aab090fe9593f9ce6469e80a0fcc74de01fe65f8d47417459cf3a20c1bbcfb.exe 88 PID 3720 wrote to memory of 4220 3720 a4aab090fe9593f9ce6469e80a0fcc74de01fe65f8d47417459cf3a20c1bbcfb.exe 88 PID 3720 wrote to memory of 4220 3720 a4aab090fe9593f9ce6469e80a0fcc74de01fe65f8d47417459cf3a20c1bbcfb.exe 88 PID 3720 wrote to memory of 4220 3720 a4aab090fe9593f9ce6469e80a0fcc74de01fe65f8d47417459cf3a20c1bbcfb.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4aab090fe9593f9ce6469e80a0fcc74de01fe65f8d47417459cf3a20c1bbcfb.exe"C:\Users\Admin\AppData\Local\Temp\a4aab090fe9593f9ce6469e80a0fcc74de01fe65f8d47417459cf3a20c1bbcfb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:4220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 1522⤵
- Program crash
PID:4176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3720 -ip 37201⤵PID:4780