Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
05/11/2023, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
ba14a8af5603a9afccb012dab5bed0c9968a75d136e13b67aa2ca25630ed7c2c.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
ba14a8af5603a9afccb012dab5bed0c9968a75d136e13b67aa2ca25630ed7c2c.exe
Resource
win10v2004-20231023-en
General
-
Target
ba14a8af5603a9afccb012dab5bed0c9968a75d136e13b67aa2ca25630ed7c2c.exe
-
Size
1.3MB
-
MD5
18b46ee90436671f8b230b142a75c3af
-
SHA1
2931498af10dc83cca50b54294a8209ee6a22b86
-
SHA256
ba14a8af5603a9afccb012dab5bed0c9968a75d136e13b67aa2ca25630ed7c2c
-
SHA512
cfd9ab35da3d5e965552767a606a1a970cb79e0f2407e06367a2e24730dc1cd77ed8d8865d211896000c0850dfccfc3899eff41885a7ec36b05c66a25d2a9106
-
SSDEEP
24576:bh+yftaJwqrHPVrijR+1J+E5FUBbKEbp5Ndc+EsL:l/tyVrxFUBmEF5r/
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2880-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2880-54-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2880 ba14a8af5603a9afccb012dab5bed0c9968a75d136e13b67aa2ca25630ed7c2c.exe 2880 ba14a8af5603a9afccb012dab5bed0c9968a75d136e13b67aa2ca25630ed7c2c.exe 2880 ba14a8af5603a9afccb012dab5bed0c9968a75d136e13b67aa2ca25630ed7c2c.exe 2880 ba14a8af5603a9afccb012dab5bed0c9968a75d136e13b67aa2ca25630ed7c2c.exe