Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 14:35
Static task
static1
Behavioral task
behavioral1
Sample
015ba33e218e675b06afc752cd894aa4.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
015ba33e218e675b06afc752cd894aa4.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
015ba33e218e675b06afc752cd894aa4.exe
-
Size
1.1MB
-
MD5
015ba33e218e675b06afc752cd894aa4
-
SHA1
c2b8bad800c7861a65843f4bade25362e66b594a
-
SHA256
111eb79948634ebd641f03bb4de48ecf66ab8bc32ffd6ebf14bbbba786de3102
-
SHA512
208f26e4357d313adf224e424880118bd4e7f7d1dac42ab915be27b9962b4c985c8c2ed0127c5080e0b41390cdf32f6d985e3d79bd48f993542d3a300e171ac6
-
SSDEEP
24576:XjmOztIjpVbUJ44R/DDK2s5mNZRzOUCrA/N3ry:XqAtI704g/D3Tm03+
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2056 set thread context of 2916 2056 015ba33e218e675b06afc752cd894aa4.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main 015ba33e218e675b06afc752cd894aa4.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2916 015ba33e218e675b06afc752cd894aa4.exe 2916 015ba33e218e675b06afc752cd894aa4.exe 2916 015ba33e218e675b06afc752cd894aa4.exe 2916 015ba33e218e675b06afc752cd894aa4.exe 2916 015ba33e218e675b06afc752cd894aa4.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2916 2056 015ba33e218e675b06afc752cd894aa4.exe 28 PID 2056 wrote to memory of 2916 2056 015ba33e218e675b06afc752cd894aa4.exe 28 PID 2056 wrote to memory of 2916 2056 015ba33e218e675b06afc752cd894aa4.exe 28 PID 2056 wrote to memory of 2916 2056 015ba33e218e675b06afc752cd894aa4.exe 28 PID 2056 wrote to memory of 2916 2056 015ba33e218e675b06afc752cd894aa4.exe 28 PID 2056 wrote to memory of 2916 2056 015ba33e218e675b06afc752cd894aa4.exe 28 PID 2056 wrote to memory of 2916 2056 015ba33e218e675b06afc752cd894aa4.exe 28 PID 2056 wrote to memory of 2916 2056 015ba33e218e675b06afc752cd894aa4.exe 28 PID 2056 wrote to memory of 2916 2056 015ba33e218e675b06afc752cd894aa4.exe 28 PID 2056 wrote to memory of 2916 2056 015ba33e218e675b06afc752cd894aa4.exe 28 PID 2056 wrote to memory of 2916 2056 015ba33e218e675b06afc752cd894aa4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\015ba33e218e675b06afc752cd894aa4.exe"C:\Users\Admin\AppData\Local\Temp\015ba33e218e675b06afc752cd894aa4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\015ba33e218e675b06afc752cd894aa4.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-