Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 14:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2524b4dd75dc6973331257b9c6ea969c.exe
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2524b4dd75dc6973331257b9c6ea969c.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2524b4dd75dc6973331257b9c6ea969c.exe
-
Size
287KB
-
MD5
2524b4dd75dc6973331257b9c6ea969c
-
SHA1
736fa19e2cb0d74910b550b7efbde53d1c6929c2
-
SHA256
17ba8da78a85a7e71b03db925fd4dbf658f3a829c2bcdd5907ab3e9410030119
-
SHA512
106cf56c073432f4a4153216bfb1f2a24aff9abbbeec42beba453fe0c72b883a0815ef132f812d5b29a6a0ea88875c425d14543a70f7bf5749125dae9b4d2875
-
SSDEEP
6144:aBv2OBkRUnsCteppHY61fvpFuHzRfQjN6YNega1VZtZ:aBO/Ktwpi69vneip6iGfv
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2792 set thread context of 2544 2792 2524b4dd75dc6973331257b9c6ea969c.exe 17 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2544 2792 2524b4dd75dc6973331257b9c6ea969c.exe 17 PID 2792 wrote to memory of 2544 2792 2524b4dd75dc6973331257b9c6ea969c.exe 17 PID 2792 wrote to memory of 2544 2792 2524b4dd75dc6973331257b9c6ea969c.exe 17 PID 2792 wrote to memory of 2544 2792 2524b4dd75dc6973331257b9c6ea969c.exe 17 PID 2792 wrote to memory of 2544 2792 2524b4dd75dc6973331257b9c6ea969c.exe 17 PID 2792 wrote to memory of 2544 2792 2524b4dd75dc6973331257b9c6ea969c.exe 17 PID 2792 wrote to memory of 2544 2792 2524b4dd75dc6973331257b9c6ea969c.exe 17 PID 2792 wrote to memory of 2544 2792 2524b4dd75dc6973331257b9c6ea969c.exe 17 PID 2792 wrote to memory of 2544 2792 2524b4dd75dc6973331257b9c6ea969c.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\2524b4dd75dc6973331257b9c6ea969c.exe"C:\Users\Admin\AppData\Local\Temp\2524b4dd75dc6973331257b9c6ea969c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2792 -
\??\c:\users\admin\appdata\local\temp\2524b4dd75dc6973331257b9c6ea969c.exe"c:\users\admin\appdata\local\temp\2524b4dd75dc6973331257b9c6ea969c.exe"2⤵PID:2544
-