Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 04:23
Behavioral task
behavioral1
Sample
6334ebbe714e4046930889e01184ed7f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6334ebbe714e4046930889e01184ed7f.exe
Resource
win10v2004-20231215-en
General
-
Target
6334ebbe714e4046930889e01184ed7f.exe
-
Size
462KB
-
MD5
6334ebbe714e4046930889e01184ed7f
-
SHA1
aa31929af08603d9803181deddb42dd6c552d794
-
SHA256
17b8efa3de8d805a2b067ffcf9ad9520a43d4e24823f063f1965871ef1066430
-
SHA512
b190fead5e01c0ea39b5134b3044f6dd1c98b8f932480b4fea22f2f15e7881a7e2aa61bc4875dae7ba2c2663f33542f12a95183cad445db71b80abb767b5c4e9
-
SSDEEP
6144:DpesgEdsW4K6o6ccT0ta+QNIIXK0b/VffQDabqlMGK:d8KB60tabDbGMGK
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2252 set thread context of 1968 2252 6334ebbe714e4046930889e01184ed7f.exe 16 -
Executes dropped EXE 1 IoCs
pid Process 1968 6334ebbe714e4046930889e01184ed7f.xgd -
Loads dropped DLL 2 IoCs
pid Process 2252 6334ebbe714e4046930889e01184ed7f.exe 2252 6334ebbe714e4046930889e01184ed7f.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2252 6334ebbe714e4046930889e01184ed7f.exe 2252 6334ebbe714e4046930889e01184ed7f.exe 1968 6334ebbe714e4046930889e01184ed7f.xgd 1968 6334ebbe714e4046930889e01184ed7f.xgd -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2252 wrote to memory of 1968 2252 6334ebbe714e4046930889e01184ed7f.exe 16 PID 2252 wrote to memory of 1968 2252 6334ebbe714e4046930889e01184ed7f.exe 16 PID 2252 wrote to memory of 1968 2252 6334ebbe714e4046930889e01184ed7f.exe 16 PID 2252 wrote to memory of 1968 2252 6334ebbe714e4046930889e01184ed7f.exe 16 PID 2252 wrote to memory of 1968 2252 6334ebbe714e4046930889e01184ed7f.exe 16 PID 2252 wrote to memory of 1968 2252 6334ebbe714e4046930889e01184ed7f.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\6334ebbe714e4046930889e01184ed7f.exe"C:\Users\Admin\AppData\Local\Temp\6334ebbe714e4046930889e01184ed7f.exe"1⤵
- Suspicious use of SetThreadContext
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\6334ebbe714e4046930889e01184ed7f.xgdC:\Users\Admin\AppData\Local\Temp\6334ebbe714e4046930889e01184ed7f.xgd2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1968
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5fab616e5e504c389fcc6434f1d20beb5
SHA187c0e49037187c43159a09ce12a3329c1bab3660
SHA25608b65738b67eef01ef49cd98feeb31af24cfc6fa5dc89aa2e908d79f0a34ce8c
SHA512a741585d24d125f18aace9fc2e7a3fc324369de6c03f2c5d14b7f694cf650b211eca2c0270b419654dc75d18be354761292cc5e95a83baf568c5ee8043c3d018