Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 09:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
152c739f87218024ba97b487ca229213.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
152c739f87218024ba97b487ca229213.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
152c739f87218024ba97b487ca229213.exe
-
Size
352KB
-
MD5
152c739f87218024ba97b487ca229213
-
SHA1
6dfd58d00a18385d12c798ba87d46a1194cbd969
-
SHA256
e44a39a023ef3df82f180c98c0479bc3e67b44a2a19656516386a420bdafa1bb
-
SHA512
0467f6fe9f11231d4df1570a497ed14e9f63a3cdcbab2c3003c356b9f83ed0e77cd858b867f33e785b44cb3738fa5fc4c1bf5473d622dcfd803b605adc4adb2a
-
SSDEEP
6144:wzYcAIs+zUK76yLY7aQEwhJ98b7w0sbCcVwpDtrYgKC:0s+t47aQEwhJ9479sbjVwpDm0
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2224 set thread context of 2656 2224 152c739f87218024ba97b487ca229213.exe 28 PID 2224 set thread context of 0 2224 152c739f87218024ba97b487ca229213.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2656 152c739f87218024ba97b487ca229213.exe 2656 152c739f87218024ba97b487ca229213.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2224 152c739f87218024ba97b487ca229213.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2656 2224 152c739f87218024ba97b487ca229213.exe 28 PID 2224 wrote to memory of 2656 2224 152c739f87218024ba97b487ca229213.exe 28 PID 2224 wrote to memory of 2656 2224 152c739f87218024ba97b487ca229213.exe 28 PID 2224 wrote to memory of 2656 2224 152c739f87218024ba97b487ca229213.exe 28 PID 2224 wrote to memory of 2656 2224 152c739f87218024ba97b487ca229213.exe 28 PID 2224 wrote to memory of 2656 2224 152c739f87218024ba97b487ca229213.exe 28 PID 2224 wrote to memory of 2656 2224 152c739f87218024ba97b487ca229213.exe 28 PID 2224 wrote to memory of 2656 2224 152c739f87218024ba97b487ca229213.exe 28 PID 2224 wrote to memory of 0 2224 152c739f87218024ba97b487ca229213.exe PID 2224 wrote to memory of 0 2224 152c739f87218024ba97b487ca229213.exe PID 2224 wrote to memory of 0 2224 152c739f87218024ba97b487ca229213.exe PID 2224 wrote to memory of 0 2224 152c739f87218024ba97b487ca229213.exe PID 2656 wrote to memory of 1280 2656 152c739f87218024ba97b487ca229213.exe 21 PID 2656 wrote to memory of 1280 2656 152c739f87218024ba97b487ca229213.exe 21 PID 2656 wrote to memory of 1280 2656 152c739f87218024ba97b487ca229213.exe 21 PID 2656 wrote to memory of 1280 2656 152c739f87218024ba97b487ca229213.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\152c739f87218024ba97b487ca229213.exe"C:\Users\Admin\AppData\Local\Temp\152c739f87218024ba97b487ca229213.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\152c739f87218024ba97b487ca229213.exe"C:\Users\Admin\AppData\Local\Temp\152c739f87218024ba97b487ca229213.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2656
-
-