Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 11:59
Static task
static1
Behavioral task
behavioral1
Sample
02525ccbc24ef21bd6162505262ce8dc34fbfd61d5444e25f69495987e65e589.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
02525ccbc24ef21bd6162505262ce8dc34fbfd61d5444e25f69495987e65e589.exe
Resource
win10v2004-20231215-en
General
-
Target
02525ccbc24ef21bd6162505262ce8dc34fbfd61d5444e25f69495987e65e589.exe
-
Size
3.4MB
-
MD5
77b147eea4247d3e1eea5dc74c55367b
-
SHA1
d7d4b364664f3d1ad6f9894a5093202d205a82a5
-
SHA256
02525ccbc24ef21bd6162505262ce8dc34fbfd61d5444e25f69495987e65e589
-
SHA512
cf041e6f8d48a2f02ca1c9d131682a172ffab1be09cec8ad091a7c786832ed4da597b1c6dc375f49ad36bee3fa5ec3630d93563870545b0f3d7a858036cb8312
-
SSDEEP
49152:qeckhLguoxcxRg6Lx6sYIzeP3+bJRQ3jaiyRbVzW0+8HDxAQwzx6AaHPkOI4fUX:Nh8uoxcxG6Lx6NyRbVK0+Gw5sPkak
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2140-0-0x0000000010000000-0x00000000105A1000-memory.dmp upx behavioral1/memory/2140-1-0x0000000010000000-0x00000000105A1000-memory.dmp upx behavioral1/memory/2140-2-0x00000000021A0000-0x00000000021DE000-memory.dmp upx behavioral1/memory/2140-3-0x00000000021A0000-0x00000000021DE000-memory.dmp upx behavioral1/memory/2140-4-0x00000000021A0000-0x00000000021DE000-memory.dmp upx behavioral1/memory/2140-5-0x00000000021A0000-0x00000000021DE000-memory.dmp upx behavioral1/memory/2140-7-0x00000000021A0000-0x00000000021DE000-memory.dmp upx behavioral1/memory/2140-9-0x00000000021A0000-0x00000000021DE000-memory.dmp upx behavioral1/memory/2140-11-0x00000000021A0000-0x00000000021DE000-memory.dmp upx behavioral1/memory/2140-15-0x00000000021A0000-0x00000000021DE000-memory.dmp upx behavioral1/memory/2140-13-0x00000000021A0000-0x00000000021DE000-memory.dmp upx behavioral1/memory/2140-17-0x00000000021A0000-0x00000000021DE000-memory.dmp upx behavioral1/memory/2140-19-0x00000000021A0000-0x00000000021DE000-memory.dmp upx behavioral1/memory/2140-22-0x00000000021A0000-0x00000000021DE000-memory.dmp upx behavioral1/memory/2140-24-0x00000000021A0000-0x00000000021DE000-memory.dmp upx behavioral1/memory/2140-28-0x0000000010000000-0x00000000105A1000-memory.dmp upx behavioral1/memory/2140-30-0x00000000021A0000-0x00000000021DE000-memory.dmp upx behavioral1/memory/2140-26-0x00000000021A0000-0x00000000021DE000-memory.dmp upx behavioral1/memory/2140-32-0x00000000021A0000-0x00000000021DE000-memory.dmp upx behavioral1/memory/2140-36-0x00000000021A0000-0x00000000021DE000-memory.dmp upx behavioral1/memory/2140-34-0x00000000021A0000-0x00000000021DE000-memory.dmp upx behavioral1/memory/2140-38-0x00000000021A0000-0x00000000021DE000-memory.dmp upx behavioral1/memory/2140-41-0x00000000021A0000-0x00000000021DE000-memory.dmp upx behavioral1/memory/2140-44-0x00000000021A0000-0x00000000021DE000-memory.dmp upx behavioral1/memory/2140-48-0x00000000021A0000-0x00000000021DE000-memory.dmp upx behavioral1/memory/2140-50-0x00000000021A0000-0x00000000021DE000-memory.dmp upx behavioral1/memory/2140-46-0x00000000021A0000-0x00000000021DE000-memory.dmp upx behavioral1/memory/2140-59-0x0000000010000000-0x00000000105A1000-memory.dmp upx behavioral1/memory/2140-60-0x0000000010000000-0x00000000105A1000-memory.dmp upx behavioral1/memory/2140-61-0x0000000010000000-0x00000000105A1000-memory.dmp upx behavioral1/memory/2140-62-0x0000000010000000-0x00000000105A1000-memory.dmp upx behavioral1/memory/2140-64-0x00000000021A0000-0x00000000021DE000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2140 02525ccbc24ef21bd6162505262ce8dc34fbfd61d5444e25f69495987e65e589.exe 2140 02525ccbc24ef21bd6162505262ce8dc34fbfd61d5444e25f69495987e65e589.exe 2140 02525ccbc24ef21bd6162505262ce8dc34fbfd61d5444e25f69495987e65e589.exe 2140 02525ccbc24ef21bd6162505262ce8dc34fbfd61d5444e25f69495987e65e589.exe