Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
161s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 11:17
Behavioral task
behavioral1
Sample
1a26c64c6d5bbf25e80ee92c3cf4b837.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
1a26c64c6d5bbf25e80ee92c3cf4b837.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
1a26c64c6d5bbf25e80ee92c3cf4b837.exe
-
Size
145KB
-
MD5
1a26c64c6d5bbf25e80ee92c3cf4b837
-
SHA1
1e75c0a7cd1c66642ca5ed4ea85c00485b59f9bd
-
SHA256
18cf2a3e0fe559398a84d467df66add00ae26d239e482525894812f617cf20e3
-
SHA512
c45775aefaa0e3046db0c7b3c76a28866791cc75b0469b4393d29fd94f949863ae6464a8c97e138858e55a95ab2b4cee82cd4fcf596b99e0ce32f43db3644112
-
SSDEEP
1536:tgLUiJJQ7gOj9sMSTyrFv0KaY4+0gzFv4D9iB5RHF0OGDshHnd8UC1bbruU/8Pdz:6LnJUgYyqF3M+x3GDGHndtClB/Gd
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2288-0-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2288 1a26c64c6d5bbf25e80ee92c3cf4b837.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2676 2288 1a26c64c6d5bbf25e80ee92c3cf4b837.exe 16 PID 2288 wrote to memory of 2676 2288 1a26c64c6d5bbf25e80ee92c3cf4b837.exe 16 PID 2288 wrote to memory of 2676 2288 1a26c64c6d5bbf25e80ee92c3cf4b837.exe 16 PID 2288 wrote to memory of 2676 2288 1a26c64c6d5bbf25e80ee92c3cf4b837.exe 16 PID 2288 wrote to memory of 2676 2288 1a26c64c6d5bbf25e80ee92c3cf4b837.exe 16 PID 2288 wrote to memory of 2676 2288 1a26c64c6d5bbf25e80ee92c3cf4b837.exe 16 PID 2288 wrote to memory of 2676 2288 1a26c64c6d5bbf25e80ee92c3cf4b837.exe 16