Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 16:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0662c98ea5fde809ac6d61994e1a3451.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
0662c98ea5fde809ac6d61994e1a3451.exe
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
0662c98ea5fde809ac6d61994e1a3451.exe
-
Size
89KB
-
MD5
0662c98ea5fde809ac6d61994e1a3451
-
SHA1
11471f9183f1b4de57a66bb47e231613de16da90
-
SHA256
6bad8ed360a449aee3f9b73a148f30040b19ad527d38d022609f3a85334d0d57
-
SHA512
d99a3ba04da346fa89ad94fababa2efd1cbb68e424c45218767ba856c000ed9a0f6350efd6a51bfc8e14c977f9449e27f6565b1dfa11a7c755370baadafd5ac5
-
SSDEEP
768:2yVLn278f+Rd4BDMVAaAF8tXID8wx8z+xSSJqM+fHfB68c8giIUq0YM7X:pDNhFSYfsUnof/s8X3q0d7X
Score
7/10
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iiddyo0i0.exe 0662c98ea5fde809ac6d61994e1a3451.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iiddyo0i0.exe 0662c98ea5fde809ac6d61994e1a3451.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1320 set thread context of 2672 1320 0662c98ea5fde809ac6d61994e1a3451.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2672 0662c98ea5fde809ac6d61994e1a3451.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1320 wrote to memory of 2672 1320 0662c98ea5fde809ac6d61994e1a3451.exe 28 PID 1320 wrote to memory of 2672 1320 0662c98ea5fde809ac6d61994e1a3451.exe 28 PID 1320 wrote to memory of 2672 1320 0662c98ea5fde809ac6d61994e1a3451.exe 28 PID 1320 wrote to memory of 2672 1320 0662c98ea5fde809ac6d61994e1a3451.exe 28 PID 1320 wrote to memory of 2672 1320 0662c98ea5fde809ac6d61994e1a3451.exe 28 PID 1320 wrote to memory of 2672 1320 0662c98ea5fde809ac6d61994e1a3451.exe 28 PID 2672 wrote to memory of 1292 2672 0662c98ea5fde809ac6d61994e1a3451.exe 14 PID 2672 wrote to memory of 1292 2672 0662c98ea5fde809ac6d61994e1a3451.exe 14 PID 2672 wrote to memory of 1292 2672 0662c98ea5fde809ac6d61994e1a3451.exe 14
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\0662c98ea5fde809ac6d61994e1a3451.exe"C:\Users\Admin\AppData\Local\Temp\0662c98ea5fde809ac6d61994e1a3451.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\0662c98ea5fde809ac6d61994e1a3451.exe"C:\Users\Admin\AppData\Local\Temp\0662c98ea5fde809ac6d61994e1a3451.exe"3⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2672
-
-