Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 16:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2d6b5f2cc3d7506633c37f1948aac97b.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2d6b5f2cc3d7506633c37f1948aac97b.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
2d6b5f2cc3d7506633c37f1948aac97b.exe
-
Size
66KB
-
MD5
2d6b5f2cc3d7506633c37f1948aac97b
-
SHA1
ebbc5d2aaee84e9abf323b1c0c70c3754989435e
-
SHA256
79345ef232cf306a40165d9e5f613a98f8a69dd565fe362509bdd514d5c4b8c2
-
SHA512
e51f6dbac833f6668c82227d297557de20cc1550d49729fd552209fa867b12fa2231d32a91313e99798f8b451c023a39457a16e8ea7dce0d857c95145ffd6f7f
-
SSDEEP
1536:MYC43ycpIXPCPoIewdsFBKnvgCYVB3YUA97ts1E7yyGh:JCxXP6oIewmrKnvgCYbXAx/7yBh
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4132 set thread context of 4524 4132 2d6b5f2cc3d7506633c37f1948aac97b.exe 89 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4132 2d6b5f2cc3d7506633c37f1948aac97b.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4132 wrote to memory of 4524 4132 2d6b5f2cc3d7506633c37f1948aac97b.exe 89 PID 4132 wrote to memory of 4524 4132 2d6b5f2cc3d7506633c37f1948aac97b.exe 89 PID 4132 wrote to memory of 4524 4132 2d6b5f2cc3d7506633c37f1948aac97b.exe 89 PID 4132 wrote to memory of 4524 4132 2d6b5f2cc3d7506633c37f1948aac97b.exe 89 PID 4132 wrote to memory of 4524 4132 2d6b5f2cc3d7506633c37f1948aac97b.exe 89 PID 4132 wrote to memory of 4524 4132 2d6b5f2cc3d7506633c37f1948aac97b.exe 89 PID 4132 wrote to memory of 4524 4132 2d6b5f2cc3d7506633c37f1948aac97b.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d6b5f2cc3d7506633c37f1948aac97b.exe"C:\Users\Admin\AppData\Local\Temp\2d6b5f2cc3d7506633c37f1948aac97b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\2d6b5f2cc3d7506633c37f1948aac97b.exeC:\Users\Admin\AppData\Local\Temp\2d6b5f2cc3d7506633c37f1948aac97b.exe2⤵PID:4524
-