Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 22:13
Static task
static1
Behavioral task
behavioral1
Sample
ce12d51c512fda7d95474a0195060ac89f2bd5cbacfce2a211472a50b91b91b8.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ce12d51c512fda7d95474a0195060ac89f2bd5cbacfce2a211472a50b91b91b8.exe
Resource
win10v2004-20230915-en
General
-
Target
ce12d51c512fda7d95474a0195060ac89f2bd5cbacfce2a211472a50b91b91b8.exe
-
Size
5.7MB
-
MD5
7cfea9c2085e8763bdc3eb74fc799dd2
-
SHA1
55d8560ef283d24ccdb5e332872a85fe24390d73
-
SHA256
ce12d51c512fda7d95474a0195060ac89f2bd5cbacfce2a211472a50b91b91b8
-
SHA512
8d9d601e3dba0adc4b1511b2bfab7ebb47566bb42dd0690db67e3997d0f7c1283c5f401b4ca0e031e2c4cf00f784c6a07966bee0e9978242765492ffe7f67752
-
SSDEEP
98304:E75RbuVSODmpG91piueVIS4JZRpLZu1JBAUZLp:ECuUprS4rIJVF
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4080-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4080-51-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4080 ce12d51c512fda7d95474a0195060ac89f2bd5cbacfce2a211472a50b91b91b8.exe 4080 ce12d51c512fda7d95474a0195060ac89f2bd5cbacfce2a211472a50b91b91b8.exe 4080 ce12d51c512fda7d95474a0195060ac89f2bd5cbacfce2a211472a50b91b91b8.exe