Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
20/11/2023, 13:03
Static task
static1
Behavioral task
behavioral1
Sample
c7e847810cddc1414cd2ae071d64aef297c8f5cafe6a5b7cf706237bb6fe8733.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
c7e847810cddc1414cd2ae071d64aef297c8f5cafe6a5b7cf706237bb6fe8733.exe
Resource
win10v2004-20231025-en
General
-
Target
c7e847810cddc1414cd2ae071d64aef297c8f5cafe6a5b7cf706237bb6fe8733.exe
-
Size
1.5MB
-
MD5
a7a2d62130bee7cd205929810386abae
-
SHA1
2515a000008cc8b17cec544f8f92fd96c341f880
-
SHA256
c7e847810cddc1414cd2ae071d64aef297c8f5cafe6a5b7cf706237bb6fe8733
-
SHA512
f5fa0874cf30844a0def5ef6de94dcb999497a122e965c77b7390f5d56d7e4ec77afaa33dbdb62b597d32460edf9d10f1f79f2a068f14245d7fde7972381a00a
-
SSDEEP
24576:oq/cZDSr3nsl9ufpEJhjWkNk5ZGdwR/+vGKQU7Qku1ZKCbT67H3Wn3m7:bHgnhiZG4/uA71oaTIH3Q3i
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2168-0-0x0000000000590000-0x00000000005CD000-memory.dmp upx behavioral1/memory/2168-1-0x0000000000590000-0x00000000005CD000-memory.dmp upx behavioral1/memory/2168-2-0x0000000000590000-0x00000000005CD000-memory.dmp upx behavioral1/memory/2168-4-0x0000000000590000-0x00000000005CD000-memory.dmp upx behavioral1/memory/2168-6-0x0000000000590000-0x00000000005CD000-memory.dmp upx behavioral1/memory/2168-8-0x0000000000590000-0x00000000005CD000-memory.dmp upx behavioral1/memory/2168-10-0x0000000000590000-0x00000000005CD000-memory.dmp upx behavioral1/memory/2168-14-0x0000000000590000-0x00000000005CD000-memory.dmp upx behavioral1/memory/2168-12-0x0000000000590000-0x00000000005CD000-memory.dmp upx behavioral1/memory/2168-17-0x0000000000590000-0x00000000005CD000-memory.dmp upx behavioral1/memory/2168-19-0x0000000000590000-0x00000000005CD000-memory.dmp upx behavioral1/memory/2168-23-0x0000000000590000-0x00000000005CD000-memory.dmp upx behavioral1/memory/2168-25-0x0000000000590000-0x00000000005CD000-memory.dmp upx behavioral1/memory/2168-29-0x0000000000590000-0x00000000005CD000-memory.dmp upx behavioral1/memory/2168-31-0x0000000000590000-0x00000000005CD000-memory.dmp upx behavioral1/memory/2168-35-0x0000000000590000-0x00000000005CD000-memory.dmp upx behavioral1/memory/2168-39-0x0000000000590000-0x00000000005CD000-memory.dmp upx behavioral1/memory/2168-41-0x0000000000590000-0x00000000005CD000-memory.dmp upx behavioral1/memory/2168-43-0x0000000000590000-0x00000000005CD000-memory.dmp upx behavioral1/memory/2168-37-0x0000000000590000-0x00000000005CD000-memory.dmp upx behavioral1/memory/2168-33-0x0000000000590000-0x00000000005CD000-memory.dmp upx behavioral1/memory/2168-27-0x0000000000590000-0x00000000005CD000-memory.dmp upx behavioral1/memory/2168-21-0x0000000000590000-0x00000000005CD000-memory.dmp upx behavioral1/memory/2168-45-0x0000000000590000-0x00000000005CD000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2168 c7e847810cddc1414cd2ae071d64aef297c8f5cafe6a5b7cf706237bb6fe8733.exe 2168 c7e847810cddc1414cd2ae071d64aef297c8f5cafe6a5b7cf706237bb6fe8733.exe 2168 c7e847810cddc1414cd2ae071d64aef297c8f5cafe6a5b7cf706237bb6fe8733.exe