Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 04:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
046e6540e567806738977a57a3bcd1cf.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
046e6540e567806738977a57a3bcd1cf.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
046e6540e567806738977a57a3bcd1cf.exe
-
Size
251KB
-
MD5
046e6540e567806738977a57a3bcd1cf
-
SHA1
a7e7b3d909699211e96ea6325ba8c4ad3fb9ea94
-
SHA256
dd2d1731eb683132876f67414e3102fe4d84d2474ee44e8dee02cdae41e6e01b
-
SHA512
5cdca8c9b906c76fa8d850ada27c364556bc84d34d5a65b9e24952348c7f9aad4055f18c31f99e182ff0da8d170f4dc20e4436f07ffe2b439a5428914e2953b4
-
SSDEEP
6144:vBfosESuJD5MhiL6w1NQA+Bw9AxYyFpT5j0M0m5Vit0iiOl:vBfPUJFneSNvle9jtj0M0m5xla
Score
1/10
Malware Config
Signatures
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}\LocalServer32 046e6540e567806738977a57a3bcd1cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\046e6540e567806738977a57a3bcd1cf.exe" 046e6540e567806738977a57a3bcd1cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\046e6540e567806738977a57a3bcd1cf.MyNSHandler\ = "this is my ebook" 046e6540e567806738977a57a3bcd1cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}\ProgID\ = "046e6540e567806738977a57a3bcd1cf.MyNSHandler" 046e6540e567806738977a57a3bcd1cf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}\ProgID 046e6540e567806738977a57a3bcd1cf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC} 046e6540e567806738977a57a3bcd1cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}\ = "this is my ebook" 046e6540e567806738977a57a3bcd1cf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\046e6540e567806738977a57a3bcd1cf.MyNSHandler 046e6540e567806738977a57a3bcd1cf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\046e6540e567806738977a57a3bcd1cf.MyNSHandler\Clsid 046e6540e567806738977a57a3bcd1cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\046e6540e567806738977a57a3bcd1cf.MyNSHandler\Clsid\ = "{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}" 046e6540e567806738977a57a3bcd1cf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1488 046e6540e567806738977a57a3bcd1cf.exe 1488 046e6540e567806738977a57a3bcd1cf.exe