Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 07:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5d417eb93be5160bff149e97f1a49169.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
5d417eb93be5160bff149e97f1a49169.exe
Resource
win10v2004-20231222-en
5 signatures
150 seconds
General
-
Target
5d417eb93be5160bff149e97f1a49169.exe
-
Size
43KB
-
MD5
5d417eb93be5160bff149e97f1a49169
-
SHA1
45a005a1b4e5d440155d8a80ae2c3c625a603fdd
-
SHA256
bddd019944f8d1a5d33bde6c3204e040d7e64ff04ac1b6e4b27a7dec051e032c
-
SHA512
8187efc3cfc9db0d2de3e984d8d856091bbf7c549325cb0bcad58bf6802e73dd8feb2649d7eac4e8ff9c218f82f4f509ee563c63c73661f7dcdc0318966a17c0
-
SSDEEP
768:iYeeUpWzliDQvxAtl5fnRgozzWUgnPHcyoU30/oZfc9MmhTAWJRVuNE7ag+x:tDpAP9nWUkPH7o20/afc9M8TAwI0W
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2676-7-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/memory/2676-4-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/memory/2676-2-0x0000000000400000-0x0000000000419000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2696 set thread context of 2676 2696 5d417eb93be5160bff149e97f1a49169.exe 30 -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2676 5d417eb93be5160bff149e97f1a49169.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2676 2696 5d417eb93be5160bff149e97f1a49169.exe 30 PID 2696 wrote to memory of 2676 2696 5d417eb93be5160bff149e97f1a49169.exe 30 PID 2696 wrote to memory of 2676 2696 5d417eb93be5160bff149e97f1a49169.exe 30 PID 2696 wrote to memory of 2676 2696 5d417eb93be5160bff149e97f1a49169.exe 30 PID 2696 wrote to memory of 2676 2696 5d417eb93be5160bff149e97f1a49169.exe 30 PID 2696 wrote to memory of 2676 2696 5d417eb93be5160bff149e97f1a49169.exe 30 PID 2696 wrote to memory of 2676 2696 5d417eb93be5160bff149e97f1a49169.exe 30 PID 2696 wrote to memory of 2676 2696 5d417eb93be5160bff149e97f1a49169.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d417eb93be5160bff149e97f1a49169.exe"C:\Users\Admin\AppData\Local\Temp\5d417eb93be5160bff149e97f1a49169.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\5d417eb93be5160bff149e97f1a49169.exe"C:\Users\Admin\AppData\Local\Temp\5d417eb93be5160bff149e97f1a49169.exe"2⤵
- Suspicious use of UnmapMainImage
PID:2676
-