Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2023, 14:11
Static task
static1
Behavioral task
behavioral1
Sample
1053a21aaf94a3db927671e8861180cdd7f7d856dfab525f35089d1eab2d10c5.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1053a21aaf94a3db927671e8861180cdd7f7d856dfab525f35089d1eab2d10c5.exe
Resource
win10v2004-20230915-en
General
-
Target
1053a21aaf94a3db927671e8861180cdd7f7d856dfab525f35089d1eab2d10c5.exe
-
Size
1.5MB
-
MD5
896a4bfdc937674aca3163b6c5c536fb
-
SHA1
eeebbb8e47b0788ef81963f00df20f7e2d9797d3
-
SHA256
1053a21aaf94a3db927671e8861180cdd7f7d856dfab525f35089d1eab2d10c5
-
SHA512
a4ec45cf42da11ea17086e23034b0768bf9aced8d23065f22cd65a1523413d0dc8bfcdf8aa2228bd8169c91db6d69204531d910898792fc778e09530840f6fdf
-
SSDEEP
24576:yRCyiDUmnp901byAJpYGDWrIP10L/wB8ispANa+GkkjfbsF:6aFnTAJLKFpA8kkz
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4636-1-0x0000000002450000-0x000000000245B000-memory.dmp upx behavioral2/memory/4636-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-27-0x0000000002450000-0x000000000245B000-memory.dmp upx behavioral2/memory/4636-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4636-52-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 4636 1053a21aaf94a3db927671e8861180cdd7f7d856dfab525f35089d1eab2d10c5.exe 4636 1053a21aaf94a3db927671e8861180cdd7f7d856dfab525f35089d1eab2d10c5.exe 4636 1053a21aaf94a3db927671e8861180cdd7f7d856dfab525f35089d1eab2d10c5.exe 4636 1053a21aaf94a3db927671e8861180cdd7f7d856dfab525f35089d1eab2d10c5.exe 4636 1053a21aaf94a3db927671e8861180cdd7f7d856dfab525f35089d1eab2d10c5.exe 4636 1053a21aaf94a3db927671e8861180cdd7f7d856dfab525f35089d1eab2d10c5.exe 4636 1053a21aaf94a3db927671e8861180cdd7f7d856dfab525f35089d1eab2d10c5.exe 4636 1053a21aaf94a3db927671e8861180cdd7f7d856dfab525f35089d1eab2d10c5.exe 4636 1053a21aaf94a3db927671e8861180cdd7f7d856dfab525f35089d1eab2d10c5.exe 4636 1053a21aaf94a3db927671e8861180cdd7f7d856dfab525f35089d1eab2d10c5.exe 4636 1053a21aaf94a3db927671e8861180cdd7f7d856dfab525f35089d1eab2d10c5.exe 4636 1053a21aaf94a3db927671e8861180cdd7f7d856dfab525f35089d1eab2d10c5.exe 4636 1053a21aaf94a3db927671e8861180cdd7f7d856dfab525f35089d1eab2d10c5.exe 4636 1053a21aaf94a3db927671e8861180cdd7f7d856dfab525f35089d1eab2d10c5.exe 4636 1053a21aaf94a3db927671e8861180cdd7f7d856dfab525f35089d1eab2d10c5.exe