Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
19/11/2023, 20:46
Static task
static1
Behavioral task
behavioral1
Sample
1438d6560513e13637d36ec1b71f07ae2ead032e83fe2233f3b1775bc16e1f50.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
1438d6560513e13637d36ec1b71f07ae2ead032e83fe2233f3b1775bc16e1f50.exe
Resource
win10v2004-20231023-en
General
-
Target
1438d6560513e13637d36ec1b71f07ae2ead032e83fe2233f3b1775bc16e1f50.exe
-
Size
588KB
-
MD5
cb3a27d3ec788b089aff106a62cfbb9b
-
SHA1
e8ea0a3fdb4f5114dc88cb679016f91a6c073259
-
SHA256
1438d6560513e13637d36ec1b71f07ae2ead032e83fe2233f3b1775bc16e1f50
-
SHA512
c6f6048891275393d91b7ad5c9db0250f0e412b2565a77a5eabc394ce4986c3cf822a67577cafa06173431b51efe6d20e451b6bab9b79ad9fb1fd84e56fc7cb3
-
SSDEEP
12288:e8718wkx7U0MYzIsNCiKRUvIpZEWmHWYfHEeeK6M8lA/+LjLQzBm/mdqV:e88wkx7EsTCizDW2zTr63lA/K3+cV
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1480 set thread context of 2696 1480 1438d6560513e13637d36ec1b71f07ae2ead032e83fe2233f3b1775bc16e1f50.exe 28 -
Program crash 1 IoCs
pid pid_target Process procid_target 2804 2696 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2696 1438d6560513e13637d36ec1b71f07ae2ead032e83fe2233f3b1775bc16e1f50.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1480 1438d6560513e13637d36ec1b71f07ae2ead032e83fe2233f3b1775bc16e1f50.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1480 wrote to memory of 2696 1480 1438d6560513e13637d36ec1b71f07ae2ead032e83fe2233f3b1775bc16e1f50.exe 28 PID 1480 wrote to memory of 2696 1480 1438d6560513e13637d36ec1b71f07ae2ead032e83fe2233f3b1775bc16e1f50.exe 28 PID 1480 wrote to memory of 2696 1480 1438d6560513e13637d36ec1b71f07ae2ead032e83fe2233f3b1775bc16e1f50.exe 28 PID 1480 wrote to memory of 2696 1480 1438d6560513e13637d36ec1b71f07ae2ead032e83fe2233f3b1775bc16e1f50.exe 28 PID 1480 wrote to memory of 2696 1480 1438d6560513e13637d36ec1b71f07ae2ead032e83fe2233f3b1775bc16e1f50.exe 28 PID 1480 wrote to memory of 2696 1480 1438d6560513e13637d36ec1b71f07ae2ead032e83fe2233f3b1775bc16e1f50.exe 28 PID 1480 wrote to memory of 2696 1480 1438d6560513e13637d36ec1b71f07ae2ead032e83fe2233f3b1775bc16e1f50.exe 28 PID 2696 wrote to memory of 2804 2696 1438d6560513e13637d36ec1b71f07ae2ead032e83fe2233f3b1775bc16e1f50.exe 29 PID 2696 wrote to memory of 2804 2696 1438d6560513e13637d36ec1b71f07ae2ead032e83fe2233f3b1775bc16e1f50.exe 29 PID 2696 wrote to memory of 2804 2696 1438d6560513e13637d36ec1b71f07ae2ead032e83fe2233f3b1775bc16e1f50.exe 29 PID 2696 wrote to memory of 2804 2696 1438d6560513e13637d36ec1b71f07ae2ead032e83fe2233f3b1775bc16e1f50.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1438d6560513e13637d36ec1b71f07ae2ead032e83fe2233f3b1775bc16e1f50.exe"C:\Users\Admin\AppData\Local\Temp\1438d6560513e13637d36ec1b71f07ae2ead032e83fe2233f3b1775bc16e1f50.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\1438d6560513e13637d36ec1b71f07ae2ead032e83fe2233f3b1775bc16e1f50.exeC:\Users\Admin\AppData\Local\Temp\1438d6560513e13637d36ec1b71f07ae2ead032e83fe2233f3b1775bc16e1f50.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 363⤵
- Program crash
PID:2804
-
-