Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 23:29
Behavioral task
behavioral1
Sample
Facebook-JPG-IMG-April15.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Facebook-JPG-IMG-April15.exe
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
Facebook-JPG-IMG-April15.exe
-
Size
153KB
-
MD5
5149631791ebb97b544058cd321e6db9
-
SHA1
5ea0b2525621b27efc15b20e2004116c4495e713
-
SHA256
28754cb6aabe6bf60e5ef94a6b2b79cc68516d479d9f4bcf083e9018edcb0b79
-
SHA512
fce57f4380a30f669ff21057957eef4c3e4813d6abc3935a02c2c2868b50c4fe0fb9f2cb7f558ad492e815f049f2c19ef97ebdb98b4ab625ab2fe0eca1e15e86
-
SSDEEP
3072:e99US8wbV7qgs6ND5FSCVxyHAWlS6qy7bj:G9U/wxi6ZlVgHAWlT
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3048-0-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral1/memory/3048-3-0x0000000000400000-0x0000000000459000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3048 Facebook-JPG-IMG-April15.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2492 3048 Facebook-JPG-IMG-April15.exe 28 PID 3048 wrote to memory of 2492 3048 Facebook-JPG-IMG-April15.exe 28 PID 3048 wrote to memory of 2492 3048 Facebook-JPG-IMG-April15.exe 28 PID 3048 wrote to memory of 2492 3048 Facebook-JPG-IMG-April15.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Facebook-JPG-IMG-April15.exe"C:\Users\Admin\AppData\Local\Temp\Facebook-JPG-IMG-April15.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\Facebook-JPG-IMG-April15.exe"C:\Users\Admin\AppData\Local\Temp\Facebook-JPG-IMG-April15.exe"2⤵PID:2492
-