Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 00:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
083ab96199b0a68712f6010d04672e5f.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
083ab96199b0a68712f6010d04672e5f.exe
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
083ab96199b0a68712f6010d04672e5f.exe
-
Size
22KB
-
MD5
083ab96199b0a68712f6010d04672e5f
-
SHA1
0971646b0f940048e71a97903f8e982e02329bf5
-
SHA256
3a63240646561df0a73b4d61bfd6c7f4a004cd5fb9bcf946001eb3ab2d556dd6
-
SHA512
fdfaf07f5ebca8033eff0d1d3734bdd43bb8c3040df377a3d58b14beaacdf88083e6bfcb1da582c414f9f13b4512066416ba26ffb42f02e39800354c7e3b8cce
-
SSDEEP
384:5/RbdsbwwlARJDKt4WN8Rc4TWXYldwxe0Z/JNJuK5ga1w1Z9AXq96bLJwO4ANoKi:jbdCwwKjDTWKRcrXYoeAJ/ZPYZ9AXn6d
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1740 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 848 wrote to memory of 1636 848 083ab96199b0a68712f6010d04672e5f.exe 28 PID 848 wrote to memory of 1636 848 083ab96199b0a68712f6010d04672e5f.exe 28 PID 848 wrote to memory of 1636 848 083ab96199b0a68712f6010d04672e5f.exe 28 PID 848 wrote to memory of 1636 848 083ab96199b0a68712f6010d04672e5f.exe 28 PID 848 wrote to memory of 1740 848 083ab96199b0a68712f6010d04672e5f.exe 29 PID 848 wrote to memory of 1740 848 083ab96199b0a68712f6010d04672e5f.exe 29 PID 848 wrote to memory of 1740 848 083ab96199b0a68712f6010d04672e5f.exe 29 PID 848 wrote to memory of 1740 848 083ab96199b0a68712f6010d04672e5f.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\083ab96199b0a68712f6010d04672e5f.exe"C:\Users\Admin\AppData\Local\Temp\083ab96199b0a68712f6010d04672e5f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:848 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵PID:1636
-
-
C:\Windows\SysWOW64\cmd.execmd /c erase /F "C:\Users\Admin\AppData\Local\Temp\083ab96199b0a68712f6010d04672e5f.exe"2⤵
- Deletes itself
PID:1740
-