Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 14:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
029bb26a09c5c24d6f21ebff0a424337.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
029bb26a09c5c24d6f21ebff0a424337.exe
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
029bb26a09c5c24d6f21ebff0a424337.exe
-
Size
144KB
-
MD5
029bb26a09c5c24d6f21ebff0a424337
-
SHA1
8165f6234d0bc58f4e6136d2e306edf16b60e012
-
SHA256
e1bfd1e46b3a2f96c03a03decb7d7a3d847d36bf3831f4bc4dc2f8a31a684b38
-
SHA512
7314daabacb135dabbd4e07233c082404a6910da022db6af10271bf0f1f9eefc8104c672002ec38eb49b2a95dee0f5476e804c914a7fdeed09fd0262ccd5d089
-
SSDEEP
3072:zeB2RL2jkC0lt0ZzLkA3l9nIwfYpJ2Xrw0I5DS5DD:YUCoC0lt0Zx3l9Iwf1teDgDD
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4468 set thread context of 4664 4468 029bb26a09c5c24d6f21ebff0a424337.exe 88 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4468 029bb26a09c5c24d6f21ebff0a424337.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4468 wrote to memory of 4664 4468 029bb26a09c5c24d6f21ebff0a424337.exe 88 PID 4468 wrote to memory of 4664 4468 029bb26a09c5c24d6f21ebff0a424337.exe 88 PID 4468 wrote to memory of 4664 4468 029bb26a09c5c24d6f21ebff0a424337.exe 88 PID 4468 wrote to memory of 4664 4468 029bb26a09c5c24d6f21ebff0a424337.exe 88 PID 4468 wrote to memory of 4664 4468 029bb26a09c5c24d6f21ebff0a424337.exe 88 PID 4468 wrote to memory of 4664 4468 029bb26a09c5c24d6f21ebff0a424337.exe 88 PID 4468 wrote to memory of 4664 4468 029bb26a09c5c24d6f21ebff0a424337.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\029bb26a09c5c24d6f21ebff0a424337.exe"C:\Users\Admin\AppData\Local\Temp\029bb26a09c5c24d6f21ebff0a424337.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\029bb26a09c5c24d6f21ebff0a424337.exeC:\Users\Admin\AppData\Local\Temp\029bb26a09c5c24d6f21ebff0a424337.exe2⤵PID:4664
-