Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 08:13
Static task
static1
Behavioral task
behavioral1
Sample
d9b37563fb49d9d74fb89b1c14dd35480054ec6e86c72c7582560a026890817b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d9b37563fb49d9d74fb89b1c14dd35480054ec6e86c72c7582560a026890817b.exe
Resource
win10v2004-20230915-en
General
-
Target
d9b37563fb49d9d74fb89b1c14dd35480054ec6e86c72c7582560a026890817b.exe
-
Size
3.9MB
-
MD5
7468144cd79e3e8b2523c6bc961c41ec
-
SHA1
f672f49081e94ad66aae3176d2137599c287a622
-
SHA256
d9b37563fb49d9d74fb89b1c14dd35480054ec6e86c72c7582560a026890817b
-
SHA512
583d8e1f1839189b1d85dce9c80314f0061a37470bae88b3ac582443e2998ae621cd5df7ff483ed7849c552676a8f9567395d6cf8301fb224235ccc6204d5aa5
-
SSDEEP
49152:AHPVlvC7NXhb4N/P8VioBDx1nq+s8KuqGaX0ToIBAUZLYbEn3+s8KuqGaX0ToIBR:QdhC7NxMFOioBVZ5JBAUZLWJBAUZLUDS
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2060-0-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2060-50-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2060 d9b37563fb49d9d74fb89b1c14dd35480054ec6e86c72c7582560a026890817b.exe 2060 d9b37563fb49d9d74fb89b1c14dd35480054ec6e86c72c7582560a026890817b.exe 2060 d9b37563fb49d9d74fb89b1c14dd35480054ec6e86c72c7582560a026890817b.exe