Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
05/10/2023, 17:52
Behavioral task
behavioral1
Sample
d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe
Resource
win10v2004-20230915-en
General
-
Target
d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe
-
Size
367KB
-
MD5
7bb054bb4409b58dd567ab9f9ed6dff1
-
SHA1
b877ad1c58a9890d4e452f143129b01d217d6948
-
SHA256
d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460
-
SHA512
7381478e11e47e3d76568c208d222b4b1f428a5cb44b392de3acb2e99caa7635e4a88313c0ac11294b28eca68d3a82d3c16460f658ffd652211f28c8a5c3ac6e
-
SSDEEP
6144:I6cTyLJOLOBpUblI3s/CpYWi+k+D7hDTzbuirVvoCo+vM3OBXIfl4nx6Hd:IaFDBke8/V2pZruS9oCo+vwi4f+nM
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2300-0-0x0000000000400000-0x0000000000522000-memory.dmp upx behavioral1/memory/2300-1-0x0000000000400000-0x0000000000522000-memory.dmp upx behavioral1/memory/2300-3-0x0000000000400000-0x0000000000522000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe 2300 d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe"C:\Users\Admin\AppData\Local\Temp\d44472f169c1ed272b55d883082af79810b756b9d3c2c3eb955e790fd94cb460.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2300