Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2023, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
e70d170f8484485762f226afaeef76049c2d0e974d5bd40c00b613da5e58d7ea.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
e70d170f8484485762f226afaeef76049c2d0e974d5bd40c00b613da5e58d7ea.exe
Resource
win10v2004-20231023-en
General
-
Target
e70d170f8484485762f226afaeef76049c2d0e974d5bd40c00b613da5e58d7ea.exe
-
Size
1.5MB
-
MD5
7e196006f715191ce7222c27db25ad70
-
SHA1
5d13865cfff73bf63df7858cc5010c75c15530b2
-
SHA256
e70d170f8484485762f226afaeef76049c2d0e974d5bd40c00b613da5e58d7ea
-
SHA512
3b2887e006289064967cca75061e21a9edb21455c5489a502907792d4c58467885c059bdd635cc0309e76f2805fa545618958602f8c6fc007271e257f8c5b6c3
-
SSDEEP
24576:TAzGx5ynRm+R5cObg/gTtXEbfRaYbVyGKZu8Bl15qx+9TuHVcBeVeZ:TahRmObzt0YeyG0uAR//
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1960-1-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1960-0-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1960-2-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1960-3-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1960-5-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1960-7-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1960-9-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1960-11-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1960-13-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1960-15-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1960-17-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1960-19-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1960-21-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1960-23-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1960-25-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1960-27-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1960-29-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1960-31-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1960-33-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1960-35-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1960-37-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1960-40-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1960-42-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1960-44-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1960-45-0x0000000010000000-0x000000001003F000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1960 e70d170f8484485762f226afaeef76049c2d0e974d5bd40c00b613da5e58d7ea.exe 1960 e70d170f8484485762f226afaeef76049c2d0e974d5bd40c00b613da5e58d7ea.exe 1960 e70d170f8484485762f226afaeef76049c2d0e974d5bd40c00b613da5e58d7ea.exe