Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
03/11/2023, 21:37
Static task
static1
Behavioral task
behavioral1
Sample
d64a7a397b0ed5904bdce649987a41acab2236c305a440d288da7d68cf68a3a1.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
d64a7a397b0ed5904bdce649987a41acab2236c305a440d288da7d68cf68a3a1.exe
Resource
win10v2004-20231020-en
General
-
Target
d64a7a397b0ed5904bdce649987a41acab2236c305a440d288da7d68cf68a3a1.exe
-
Size
3.0MB
-
MD5
a85625c4a84d2f291b4d762c66793f31
-
SHA1
d36ca5445e3fb9acf622a69a1edec2c011517ac4
-
SHA256
d64a7a397b0ed5904bdce649987a41acab2236c305a440d288da7d68cf68a3a1
-
SHA512
5ca31e2a7e0cba18b08150036716207007228ed690dc05c96fbd58923b8ccd05057553b8abac82ecad93bf38e676e9d5ffe0e889d144aa35e655855d6c9b3d25
-
SSDEEP
49152:YAYdPQw5Q9MhOfJ82JFQrhOpmA6ak+s8KuqGaX0ToIBAUZLY5:dyPQeQ9MEfJFJFQrkAA6CJBAUZL
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\MSreins.ini d64a7a397b0ed5904bdce649987a41acab2236c305a440d288da7d68cf68a3a1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2772 d64a7a397b0ed5904bdce649987a41acab2236c305a440d288da7d68cf68a3a1.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2772 d64a7a397b0ed5904bdce649987a41acab2236c305a440d288da7d68cf68a3a1.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2772 d64a7a397b0ed5904bdce649987a41acab2236c305a440d288da7d68cf68a3a1.exe 2772 d64a7a397b0ed5904bdce649987a41acab2236c305a440d288da7d68cf68a3a1.exe 2772 d64a7a397b0ed5904bdce649987a41acab2236c305a440d288da7d68cf68a3a1.exe 2772 d64a7a397b0ed5904bdce649987a41acab2236c305a440d288da7d68cf68a3a1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d64a7a397b0ed5904bdce649987a41acab2236c305a440d288da7d68cf68a3a1.exe"C:\Users\Admin\AppData\Local\Temp\d64a7a397b0ed5904bdce649987a41acab2236c305a440d288da7d68cf68a3a1.exe"1⤵
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2772