Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 02:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0beb86a027950cbacf7bc41e2c03fd34.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
0beb86a027950cbacf7bc41e2c03fd34.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
0beb86a027950cbacf7bc41e2c03fd34.exe
-
Size
232KB
-
MD5
0beb86a027950cbacf7bc41e2c03fd34
-
SHA1
7383ab7e7bf39ebf47bd7e96c8d4d011d6ec9895
-
SHA256
20a319675d7eecd19b38896b8af0b200ac5383ddfcda02b36503a98a2df4d7ca
-
SHA512
87d94169cc004148255973db34beb06de390486f95cc11d3f798d8934f6e2ff2f3560e9500135dc667114a7ace654471cb8b7125acfd81ae787dc1365debcb33
-
SSDEEP
1536:Z7+8G2zxAWT6TmjX88zHUft9qVxAWi6x2QzLU4BFdZhzPQ2C1CvGQJbsE5pUDwij:Zy1QF2QzBLdUp1CzjoOG9+6WYVTiPM
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\system display drive = "C:\\Users\\Admin\\AppData\\Roaming\\Sys32Disp.exe.exe" 0beb86a027950cbacf7bc41e2c03fd34.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system display drive = "C:\\Users\\Admin\\AppData\\Roaming\\Sys32Disp.exe.exe" 0beb86a027950cbacf7bc41e2c03fd34.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2488 set thread context of 2516 2488 0beb86a027950cbacf7bc41e2c03fd34.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main 0beb86a027950cbacf7bc41e2c03fd34.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2488 0beb86a027950cbacf7bc41e2c03fd34.exe 2516 0beb86a027950cbacf7bc41e2c03fd34.exe 2516 0beb86a027950cbacf7bc41e2c03fd34.exe 2516 0beb86a027950cbacf7bc41e2c03fd34.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2516 2488 0beb86a027950cbacf7bc41e2c03fd34.exe 28 PID 2488 wrote to memory of 2516 2488 0beb86a027950cbacf7bc41e2c03fd34.exe 28 PID 2488 wrote to memory of 2516 2488 0beb86a027950cbacf7bc41e2c03fd34.exe 28 PID 2488 wrote to memory of 2516 2488 0beb86a027950cbacf7bc41e2c03fd34.exe 28 PID 2488 wrote to memory of 2516 2488 0beb86a027950cbacf7bc41e2c03fd34.exe 28 PID 2488 wrote to memory of 2516 2488 0beb86a027950cbacf7bc41e2c03fd34.exe 28 PID 2488 wrote to memory of 2516 2488 0beb86a027950cbacf7bc41e2c03fd34.exe 28 PID 2488 wrote to memory of 2516 2488 0beb86a027950cbacf7bc41e2c03fd34.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0beb86a027950cbacf7bc41e2c03fd34.exe"C:\Users\Admin\AppData\Local\Temp\0beb86a027950cbacf7bc41e2c03fd34.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\0beb86a027950cbacf7bc41e2c03fd34.exe"C:\Users\Admin\AppData\Local\Temp\0beb86a027950cbacf7bc41e2c03fd34.exe"2⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2516
-