Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 11:07
Static task
static1
Behavioral task
behavioral1
Sample
aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe
Resource
win10v2004-20230915-en
General
-
Target
aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe
-
Size
1.6MB
-
MD5
0591bd5440dc0cec70b42d2538b2ac59
-
SHA1
ba56f4f137abdb79025cfb6f41ea949bcaf71f92
-
SHA256
aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6
-
SHA512
d4c46335d08a569ff9a22dacee8454d33d99185663ab768358d404c1a53f7f73a90857b0e0a7b65559fcfe11bc3efe689c2bd8a9ab693868fa6573acee09ff92
-
SSDEEP
24576:yVrD/YlJgqMwMwyQZ3rWQ2JLuNy7fjv5km8rsMZKQVhGddwG38wbc1j:6UlJgCMwyW8JLMy7jvSXOQ/Idw4xg
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1384-8695-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1384-8707-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1384-8709-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1384-8714-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1384-8726-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1384-8729-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1384-8742-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1384-8745-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1384-8747-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 28 IoCs
pid Process 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe 1384 aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe"C:\Users\Admin\AppData\Local\Temp\aec823eaa1b4331a8df61631ca60806f67a5b70536178c5702e0f1975860d7c6.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:1384