Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 03:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5067c2a84b065108dcf123bbf16bff6c.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
5067c2a84b065108dcf123bbf16bff6c.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
5067c2a84b065108dcf123bbf16bff6c.exe
-
Size
476KB
-
MD5
5067c2a84b065108dcf123bbf16bff6c
-
SHA1
43b0f8271cf4738baa8b45190289d10bc716e055
-
SHA256
e4627236e0996a44136c77798a5c41443488d99536e65a9e2c971803d5e6c73f
-
SHA512
ecd55fe4ab36ffb87cc397519529f4f9208cad668a79df708e831f103b07b72547fe15e9bccbaab25bed748b09047abee617144c1b69c65d46c5d2b78ddc2e06
-
SSDEEP
6144:QyJZv5zFiIO5K9vxsJr6x7oEooLuV9u3SKk9e2dkIZFF2Ag:QcLFQ6KEHi98
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3976 set thread context of 4436 3976 5067c2a84b065108dcf123bbf16bff6c.exe 17 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3976 wrote to memory of 4436 3976 5067c2a84b065108dcf123bbf16bff6c.exe 17 PID 3976 wrote to memory of 4436 3976 5067c2a84b065108dcf123bbf16bff6c.exe 17 PID 3976 wrote to memory of 4436 3976 5067c2a84b065108dcf123bbf16bff6c.exe 17 PID 3976 wrote to memory of 4436 3976 5067c2a84b065108dcf123bbf16bff6c.exe 17 PID 3976 wrote to memory of 4436 3976 5067c2a84b065108dcf123bbf16bff6c.exe 17 PID 3976 wrote to memory of 4436 3976 5067c2a84b065108dcf123bbf16bff6c.exe 17 PID 3976 wrote to memory of 4436 3976 5067c2a84b065108dcf123bbf16bff6c.exe 17 PID 3976 wrote to memory of 4436 3976 5067c2a84b065108dcf123bbf16bff6c.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\5067c2a84b065108dcf123bbf16bff6c.exe"C:\Users\Admin\AppData\Local\Temp\5067c2a84b065108dcf123bbf16bff6c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\5067c2a84b065108dcf123bbf16bff6c.exe"C:\Users\Admin\AppData\Local\Temp\5067c2a84b065108dcf123bbf16bff6c.exe"2⤵PID:4436
-