Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2023, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
ba14a8af5603a9afccb012dab5bed0c9968a75d136e13b67aa2ca25630ed7c2c.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
ba14a8af5603a9afccb012dab5bed0c9968a75d136e13b67aa2ca25630ed7c2c.exe
Resource
win10v2004-20231023-en
General
-
Target
ba14a8af5603a9afccb012dab5bed0c9968a75d136e13b67aa2ca25630ed7c2c.exe
-
Size
1.3MB
-
MD5
18b46ee90436671f8b230b142a75c3af
-
SHA1
2931498af10dc83cca50b54294a8209ee6a22b86
-
SHA256
ba14a8af5603a9afccb012dab5bed0c9968a75d136e13b67aa2ca25630ed7c2c
-
SHA512
cfd9ab35da3d5e965552767a606a1a970cb79e0f2407e06367a2e24730dc1cd77ed8d8865d211896000c0850dfccfc3899eff41885a7ec36b05c66a25d2a9106
-
SSDEEP
24576:bh+yftaJwqrHPVrijR+1J+E5FUBbKEbp5Ndc+EsL:l/tyVrxFUBmEF5r/
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3364-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3364-50-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3364 ba14a8af5603a9afccb012dab5bed0c9968a75d136e13b67aa2ca25630ed7c2c.exe 3364 ba14a8af5603a9afccb012dab5bed0c9968a75d136e13b67aa2ca25630ed7c2c.exe 3364 ba14a8af5603a9afccb012dab5bed0c9968a75d136e13b67aa2ca25630ed7c2c.exe 3364 ba14a8af5603a9afccb012dab5bed0c9968a75d136e13b67aa2ca25630ed7c2c.exe