Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 22:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
147b4bf14a27d5da315206ea9ec05f7f.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
147b4bf14a27d5da315206ea9ec05f7f.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
147b4bf14a27d5da315206ea9ec05f7f.exe
-
Size
167KB
-
MD5
147b4bf14a27d5da315206ea9ec05f7f
-
SHA1
1fa5cdc1a83bbe9184b1b26dde614ba5bcaf740d
-
SHA256
c443ef0cadc12797acfe7c7e5940b74e3b793cd5ba0298d8faea79e73d38858b
-
SHA512
887c76c453888ed95678497720790b5ab6196303194a8fc4c1198367b42b38d9edbdd35df671737651c698ac964fb86e98f96e58b6470a3887f99a97a63cba34
-
SSDEEP
3072:Brs5ofQfSTx/00mjlPCyi9EV52qLNqpi+O/a180E9fnjMqkH88wNZTvxLxm2:BQ5oYfSBClKl9O52qpCi+ua18N9PjMqv
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2168 set thread context of 1740 2168 147b4bf14a27d5da315206ea9ec05f7f.exe 28 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2168 wrote to memory of 1740 2168 147b4bf14a27d5da315206ea9ec05f7f.exe 28 PID 2168 wrote to memory of 1740 2168 147b4bf14a27d5da315206ea9ec05f7f.exe 28 PID 2168 wrote to memory of 1740 2168 147b4bf14a27d5da315206ea9ec05f7f.exe 28 PID 2168 wrote to memory of 1740 2168 147b4bf14a27d5da315206ea9ec05f7f.exe 28 PID 2168 wrote to memory of 1740 2168 147b4bf14a27d5da315206ea9ec05f7f.exe 28 PID 2168 wrote to memory of 1740 2168 147b4bf14a27d5da315206ea9ec05f7f.exe 28 PID 2168 wrote to memory of 1740 2168 147b4bf14a27d5da315206ea9ec05f7f.exe 28 PID 2168 wrote to memory of 1740 2168 147b4bf14a27d5da315206ea9ec05f7f.exe 28 PID 2168 wrote to memory of 1740 2168 147b4bf14a27d5da315206ea9ec05f7f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\147b4bf14a27d5da315206ea9ec05f7f.exe"C:\Users\Admin\AppData\Local\Temp\147b4bf14a27d5da315206ea9ec05f7f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\147b4bf14a27d5da315206ea9ec05f7f.exeC:\Users\Admin\AppData\Local\Temp\147b4bf14a27d5da315206ea9ec05f7f.exe2⤵PID:1740
-