Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
216s -
max time network
187s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 05:06
Static task
static1
Behavioral task
behavioral1
Sample
5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe
Resource
win10v2004-20230915-en
General
-
Target
5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe
-
Size
2.8MB
-
MD5
35e288c998c6bd998a015bc409d8e5e2
-
SHA1
62e2b709f96d0ac168a9909ee48b81bc803b93c7
-
SHA256
5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d
-
SHA512
932446a648339e33fb1aff05b0ef31f2ca2e8f09da5b22025c401aabca758d4130368c7d2a008963d57d48d02bec2f030ddbd216cf743565f72a86763d4e9aa3
-
SSDEEP
49152:ra7vo3ZM0DqFJckphaaB6PtjPxWK1hOhhZmy4AQoTbO0tIsJ:ra7ApT+FJu7HfLEbQoTbOOJ
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2708-8704-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2708-8730-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2708-8734-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2708-8742-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2708-8738-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2708-8745-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2708-8750-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2708-8754-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2708-8755-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 22 IoCs
pid Process 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe 2708 5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe"C:\Users\Admin\AppData\Local\Temp\5a4585eba262fa835563e5dafb33e22ae2fa7a79f26760defee00f3f67f4776d.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2708