Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
163s -
max time network
201s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 12:35
Behavioral task
behavioral1
Sample
6eec719e104b53e6311ea935d32b3fc7.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
6eec719e104b53e6311ea935d32b3fc7.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
6eec719e104b53e6311ea935d32b3fc7.exe
-
Size
90KB
-
MD5
6eec719e104b53e6311ea935d32b3fc7
-
SHA1
4abe9c0c281465a1fa2a178d371c901c084e3791
-
SHA256
765ab8fd3605fb6ecd0dd70507d3a21f5a49e21f4dd0b369767d7bf364a3fda4
-
SHA512
962957215e4b66ea55fde8b4d689bdec3b063610bb83886620b0219db4920cb72800a49718ddbf5c51101df157aac92e3241fbe62da54db1e619d466e076ab8d
-
SSDEEP
1536:AAsqhD+MFIoGMfa4PhAJkAluAOv2xMbwp+uaEst7ez5WnmP6XOSLr+k/8YjF:AAsqplIo9pAluAdM8aEsxez5WnCpCh/p
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/864-0-0x0000000000400000-0x0000000000425000-memory.dmp upx -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 864 6eec719e104b53e6311ea935d32b3fc7.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 864 wrote to memory of 4592 864 6eec719e104b53e6311ea935d32b3fc7.exe 89 PID 864 wrote to memory of 4592 864 6eec719e104b53e6311ea935d32b3fc7.exe 89 PID 864 wrote to memory of 4592 864 6eec719e104b53e6311ea935d32b3fc7.exe 89 PID 864 wrote to memory of 4592 864 6eec719e104b53e6311ea935d32b3fc7.exe 89 PID 864 wrote to memory of 4592 864 6eec719e104b53e6311ea935d32b3fc7.exe 89