Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 03:34
Behavioral task
behavioral1
Sample
0d1f3290c15c203d7eb461f9d3e85e3a.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0d1f3290c15c203d7eb461f9d3e85e3a.exe
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
0d1f3290c15c203d7eb461f9d3e85e3a.exe
-
Size
1.3MB
-
MD5
0d1f3290c15c203d7eb461f9d3e85e3a
-
SHA1
0df94ca2fd627e0c0528d1ff78d4d4d3154081ea
-
SHA256
0cefb6de228954e7fd89bb04e0ff9b3207925a066c9a32d43d717ad2304f848e
-
SHA512
8f86bd0dff6c55c75c4419b2680a3a08eb7ec2fc5e95eb2ce34f1b3f7d3dc610e9c44ccb18f296e9bf0c2dfd1674f492db6f2f1973425bb45d8f7aacd0d44fa1
-
SSDEEP
24576:/KyTwoVsahSI/r3qCPjEYZ2aEojlblO7HD6F0WXDzzkxQfTAr:/KohmV0ya2HilblODeFVz3zTu
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2608-0-0x0000000000400000-0x0000000000671DFC-memory.dmp themida behavioral1/memory/2608-3-0x0000000000400000-0x0000000000671DFC-memory.dmp themida behavioral1/memory/2608-7-0x0000000000400000-0x0000000000671DFC-memory.dmp themida -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2608 0d1f3290c15c203d7eb461f9d3e85e3a.exe 2608 0d1f3290c15c203d7eb461f9d3e85e3a.exe 2608 0d1f3290c15c203d7eb461f9d3e85e3a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2608 wrote to memory of 1248 2608 0d1f3290c15c203d7eb461f9d3e85e3a.exe 9 PID 2608 wrote to memory of 1248 2608 0d1f3290c15c203d7eb461f9d3e85e3a.exe 9 PID 2608 wrote to memory of 1248 2608 0d1f3290c15c203d7eb461f9d3e85e3a.exe 9 PID 2608 wrote to memory of 1248 2608 0d1f3290c15c203d7eb461f9d3e85e3a.exe 9 PID 2608 wrote to memory of 1248 2608 0d1f3290c15c203d7eb461f9d3e85e3a.exe 9 PID 2608 wrote to memory of 1248 2608 0d1f3290c15c203d7eb461f9d3e85e3a.exe 9
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\0d1f3290c15c203d7eb461f9d3e85e3a.exe"C:\Users\Admin\AppData\Local\Temp\0d1f3290c15c203d7eb461f9d3e85e3a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2608
-