Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 23:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2036bc58705189d6c3008ee24fb4c7db.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2036bc58705189d6c3008ee24fb4c7db.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2036bc58705189d6c3008ee24fb4c7db.exe
-
Size
7KB
-
MD5
2036bc58705189d6c3008ee24fb4c7db
-
SHA1
b040ef7a34533d6e3e42c0cca21140683282f994
-
SHA256
a1ff015855ba1ac48cff4986392551677e9d949129821684a5e8fada6d6b3d80
-
SHA512
89e879efdc41922d807a306bd1f90b6faa8e9067e3c14a5548fdd13e6966e1ac4f745e8710386dde5ce5d51eaf211b8a71ab4a8cde0ce041751c6f78136aacb5
-
SSDEEP
192:DLlwZxiWeirHZ5pzlmNXEXALsl7usOwni:n2oWnrHZvzQXbshu
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4072 set thread context of 3712 4072 2036bc58705189d6c3008ee24fb4c7db.exe 92 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4072 wrote to memory of 3712 4072 2036bc58705189d6c3008ee24fb4c7db.exe 92 PID 4072 wrote to memory of 3712 4072 2036bc58705189d6c3008ee24fb4c7db.exe 92 PID 4072 wrote to memory of 3712 4072 2036bc58705189d6c3008ee24fb4c7db.exe 92 PID 4072 wrote to memory of 3712 4072 2036bc58705189d6c3008ee24fb4c7db.exe 92 PID 4072 wrote to memory of 3712 4072 2036bc58705189d6c3008ee24fb4c7db.exe 92 PID 4072 wrote to memory of 3712 4072 2036bc58705189d6c3008ee24fb4c7db.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2036bc58705189d6c3008ee24fb4c7db.exe"C:\Users\Admin\AppData\Local\Temp\2036bc58705189d6c3008ee24fb4c7db.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\2036bc58705189d6c3008ee24fb4c7db.exe"C:\Users\Admin\AppData\Local\Temp\2036bc58705189d6c3008ee24fb4c7db.exe"2⤵PID:3712
-