Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
c9857074eff8cadca2b6d83179dee505831b02ca629b78dc824f8bd86b0f88e5.exe
Resource
win7-20230831-en
3 signatures
150 seconds
General
-
Target
c9857074eff8cadca2b6d83179dee505831b02ca629b78dc824f8bd86b0f88e5.exe
-
Size
365KB
-
MD5
6a4be4984268b8a62d6c96fc5cf05069
-
SHA1
d3ee4ba3257107b81c2f2016020acf2008be2c34
-
SHA256
c9857074eff8cadca2b6d83179dee505831b02ca629b78dc824f8bd86b0f88e5
-
SHA512
2f692913d946b7f2dce0d0cda556b1832ffdda018b74fdd440e1c74df67f67080ad88904a0226f6cbd7c3c4cccf068ca89767120e14271e04c51f17feffff7ac
-
SSDEEP
6144:sD5frpxdonyq4zaG2u5AONeKfdTTmBiT1K+3FLrgquqp:sdrp0/9u5TeAHmsvgquqp
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2088 set thread context of 2012 2088 c9857074eff8cadca2b6d83179dee505831b02ca629b78dc824f8bd86b0f88e5.exe 28 -
Program crash 2 IoCs
pid pid_target Process procid_target 2328 2088 WerFault.exe 9 2724 2012 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2012 2088 c9857074eff8cadca2b6d83179dee505831b02ca629b78dc824f8bd86b0f88e5.exe 28 PID 2088 wrote to memory of 2012 2088 c9857074eff8cadca2b6d83179dee505831b02ca629b78dc824f8bd86b0f88e5.exe 28 PID 2088 wrote to memory of 2012 2088 c9857074eff8cadca2b6d83179dee505831b02ca629b78dc824f8bd86b0f88e5.exe 28 PID 2088 wrote to memory of 2012 2088 c9857074eff8cadca2b6d83179dee505831b02ca629b78dc824f8bd86b0f88e5.exe 28 PID 2088 wrote to memory of 2012 2088 c9857074eff8cadca2b6d83179dee505831b02ca629b78dc824f8bd86b0f88e5.exe 28 PID 2088 wrote to memory of 2012 2088 c9857074eff8cadca2b6d83179dee505831b02ca629b78dc824f8bd86b0f88e5.exe 28 PID 2088 wrote to memory of 2012 2088 c9857074eff8cadca2b6d83179dee505831b02ca629b78dc824f8bd86b0f88e5.exe 28 PID 2088 wrote to memory of 2012 2088 c9857074eff8cadca2b6d83179dee505831b02ca629b78dc824f8bd86b0f88e5.exe 28 PID 2088 wrote to memory of 2012 2088 c9857074eff8cadca2b6d83179dee505831b02ca629b78dc824f8bd86b0f88e5.exe 28 PID 2088 wrote to memory of 2012 2088 c9857074eff8cadca2b6d83179dee505831b02ca629b78dc824f8bd86b0f88e5.exe 28 PID 2088 wrote to memory of 2012 2088 c9857074eff8cadca2b6d83179dee505831b02ca629b78dc824f8bd86b0f88e5.exe 28 PID 2088 wrote to memory of 2012 2088 c9857074eff8cadca2b6d83179dee505831b02ca629b78dc824f8bd86b0f88e5.exe 28 PID 2088 wrote to memory of 2012 2088 c9857074eff8cadca2b6d83179dee505831b02ca629b78dc824f8bd86b0f88e5.exe 28 PID 2088 wrote to memory of 2012 2088 c9857074eff8cadca2b6d83179dee505831b02ca629b78dc824f8bd86b0f88e5.exe 28 PID 2088 wrote to memory of 2328 2088 c9857074eff8cadca2b6d83179dee505831b02ca629b78dc824f8bd86b0f88e5.exe 29 PID 2088 wrote to memory of 2328 2088 c9857074eff8cadca2b6d83179dee505831b02ca629b78dc824f8bd86b0f88e5.exe 29 PID 2088 wrote to memory of 2328 2088 c9857074eff8cadca2b6d83179dee505831b02ca629b78dc824f8bd86b0f88e5.exe 29 PID 2088 wrote to memory of 2328 2088 c9857074eff8cadca2b6d83179dee505831b02ca629b78dc824f8bd86b0f88e5.exe 29 PID 2012 wrote to memory of 2724 2012 AppLaunch.exe 30 PID 2012 wrote to memory of 2724 2012 AppLaunch.exe 30 PID 2012 wrote to memory of 2724 2012 AppLaunch.exe 30 PID 2012 wrote to memory of 2724 2012 AppLaunch.exe 30 PID 2012 wrote to memory of 2724 2012 AppLaunch.exe 30 PID 2012 wrote to memory of 2724 2012 AppLaunch.exe 30 PID 2012 wrote to memory of 2724 2012 AppLaunch.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9857074eff8cadca2b6d83179dee505831b02ca629b78dc824f8bd86b0f88e5.exe"C:\Users\Admin\AppData\Local\Temp\c9857074eff8cadca2b6d83179dee505831b02ca629b78dc824f8bd86b0f88e5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 1963⤵
- Program crash
PID:2724
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 922⤵
- Program crash
PID:2328
-