Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 12:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6f9ca05488507f4a66537a02ea081f72.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
6f9ca05488507f4a66537a02ea081f72.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
6f9ca05488507f4a66537a02ea081f72.exe
-
Size
146KB
-
MD5
6f9ca05488507f4a66537a02ea081f72
-
SHA1
6f05213eb71a47208d018fee3a6bfcb8fa75e64c
-
SHA256
71588216d067a7a4a68a20e254e092a7b9af7a8257a5635ffdb156d4ddc83285
-
SHA512
375c64e201ab6dffba7a45e0d0196c4ee057206148ad4f1a9a7e9ad48cf48b49bb2c61f60121f443cda67218dc87ca027dd66a7a409aa0c17c9eb78d743f9cb7
-
SSDEEP
1536:vx2QlC7NudFiob7y1UH/x33KhIzF/eE7iG/hVg1/hrOGrLIEiRNsdkSd9w4wn37z:p2QlCX1UH/HuFqNMXqTKaPRYLqfyOpv
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2024 set thread context of 1876 2024 6f9ca05488507f4a66537a02ea081f72.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1876 6f9ca05488507f4a66537a02ea081f72.exe 1876 6f9ca05488507f4a66537a02ea081f72.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2024 6f9ca05488507f4a66537a02ea081f72.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1876 2024 6f9ca05488507f4a66537a02ea081f72.exe 28 PID 2024 wrote to memory of 1876 2024 6f9ca05488507f4a66537a02ea081f72.exe 28 PID 2024 wrote to memory of 1876 2024 6f9ca05488507f4a66537a02ea081f72.exe 28 PID 2024 wrote to memory of 1876 2024 6f9ca05488507f4a66537a02ea081f72.exe 28 PID 2024 wrote to memory of 1876 2024 6f9ca05488507f4a66537a02ea081f72.exe 28 PID 2024 wrote to memory of 1876 2024 6f9ca05488507f4a66537a02ea081f72.exe 28 PID 2024 wrote to memory of 1876 2024 6f9ca05488507f4a66537a02ea081f72.exe 28 PID 2024 wrote to memory of 1876 2024 6f9ca05488507f4a66537a02ea081f72.exe 28 PID 2024 wrote to memory of 1876 2024 6f9ca05488507f4a66537a02ea081f72.exe 28 PID 2024 wrote to memory of 1876 2024 6f9ca05488507f4a66537a02ea081f72.exe 28 PID 2024 wrote to memory of 1876 2024 6f9ca05488507f4a66537a02ea081f72.exe 28 PID 1876 wrote to memory of 1144 1876 6f9ca05488507f4a66537a02ea081f72.exe 14 PID 1876 wrote to memory of 1144 1876 6f9ca05488507f4a66537a02ea081f72.exe 14 PID 1876 wrote to memory of 1144 1876 6f9ca05488507f4a66537a02ea081f72.exe 14 PID 1876 wrote to memory of 1144 1876 6f9ca05488507f4a66537a02ea081f72.exe 14
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\6f9ca05488507f4a66537a02ea081f72.exe"C:\Users\Admin\AppData\Local\Temp\6f9ca05488507f4a66537a02ea081f72.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\6f9ca05488507f4a66537a02ea081f72.exe
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1876
-
-