Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 18:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
35afcf29afedbc371e446aaed65de901.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
35afcf29afedbc371e446aaed65de901.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
35afcf29afedbc371e446aaed65de901.exe
-
Size
182KB
-
MD5
35afcf29afedbc371e446aaed65de901
-
SHA1
54493d831985f569947e43cfc0bf952969860eb2
-
SHA256
6fbd2934f653f5085f7ae0b974f11673494f076770e28f6e9b7e1867d783a06b
-
SHA512
57d67f8f4aebe5a5178d5ae2e9318cb05f1c2d3c97b04c3a63b5ddac80f51228cf88991371cd94e1832d30aea684f2ac07bb11b5f88ce8da7645cb321dc6d648
-
SSDEEP
3072:3HMAmgoqaNU1LiOyzb0qkVoDiYE2/+S5io/Hw3a5YHG3Pzrc77OWw8x8cj:3HbaNQG4qkVoDiB22B2Hw3alXc769/cj
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3836 set thread context of 1408 3836 35afcf29afedbc371e446aaed65de901.exe 88 PID 3836 set thread context of 0 3836 35afcf29afedbc371e446aaed65de901.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 35afcf29afedbc371e446aaed65de901.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 35afcf29afedbc371e446aaed65de901.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1408 35afcf29afedbc371e446aaed65de901.exe 1408 35afcf29afedbc371e446aaed65de901.exe 1408 35afcf29afedbc371e446aaed65de901.exe 1408 35afcf29afedbc371e446aaed65de901.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3836 35afcf29afedbc371e446aaed65de901.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3836 wrote to memory of 1408 3836 35afcf29afedbc371e446aaed65de901.exe 88 PID 3836 wrote to memory of 1408 3836 35afcf29afedbc371e446aaed65de901.exe 88 PID 3836 wrote to memory of 1408 3836 35afcf29afedbc371e446aaed65de901.exe 88 PID 3836 wrote to memory of 1408 3836 35afcf29afedbc371e446aaed65de901.exe 88 PID 3836 wrote to memory of 1408 3836 35afcf29afedbc371e446aaed65de901.exe 88 PID 3836 wrote to memory of 1408 3836 35afcf29afedbc371e446aaed65de901.exe 88 PID 3836 wrote to memory of 1408 3836 35afcf29afedbc371e446aaed65de901.exe 88 PID 3836 wrote to memory of 0 3836 35afcf29afedbc371e446aaed65de901.exe PID 3836 wrote to memory of 0 3836 35afcf29afedbc371e446aaed65de901.exe PID 3836 wrote to memory of 0 3836 35afcf29afedbc371e446aaed65de901.exe PID 3836 wrote to memory of 0 3836 35afcf29afedbc371e446aaed65de901.exe PID 1408 wrote to memory of 3328 1408 35afcf29afedbc371e446aaed65de901.exe 48 PID 1408 wrote to memory of 3328 1408 35afcf29afedbc371e446aaed65de901.exe 48 PID 1408 wrote to memory of 3328 1408 35afcf29afedbc371e446aaed65de901.exe 48 PID 1408 wrote to memory of 3328 1408 35afcf29afedbc371e446aaed65de901.exe 48
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\35afcf29afedbc371e446aaed65de901.exe"C:\Users\Admin\AppData\Local\Temp\35afcf29afedbc371e446aaed65de901.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\35afcf29afedbc371e446aaed65de901.exe"C:\Users\Admin\AppData\Local\Temp\35afcf29afedbc371e446aaed65de901.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1408
-
-