Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 04:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Soar Installer.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Soar Installer.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
Soar Installer.exe
-
Size
76.3MB
-
MD5
4175b4ca85b0c2a70eec398354ac57e3
-
SHA1
2db6fb3a6b9cabb29dcdd8a91aca8ef9136fd436
-
SHA256
d3f8e7201ccb06225fe22fa19f5ab5c781ea34e66e120836066845711fe88f2e
-
SHA512
7fd55889ed25f4e8e537b157e3ddff61d2d83503b0a55c65df4a2e4d6349c0c408c66a860ba7441f33bc2f3cd1455b747ff176394daed42bba9d2b55e845e18a
-
SSDEEP
1572864:ypSi+t2/oOyCdG/cfCi8ivkRmqRpeZH5CCUWuEXDQIjHnHeydt4QO:YI2dxUcfCi8+kRJEZH5CCXXbjHHFdSQO
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2360 Soar Installer.tmp -
Loads dropped DLL 1 IoCs
pid Process 2652 Soar Installer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2360 Soar Installer.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2360 2652 Soar Installer.exe 28 PID 2652 wrote to memory of 2360 2652 Soar Installer.exe 28 PID 2652 wrote to memory of 2360 2652 Soar Installer.exe 28 PID 2652 wrote to memory of 2360 2652 Soar Installer.exe 28 PID 2652 wrote to memory of 2360 2652 Soar Installer.exe 28 PID 2652 wrote to memory of 2360 2652 Soar Installer.exe 28 PID 2652 wrote to memory of 2360 2652 Soar Installer.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Soar Installer.exe"C:\Users\Admin\AppData\Local\Temp\Soar Installer.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\is-9CT89.tmp\Soar Installer.tmp"C:\Users\Admin\AppData\Local\Temp\is-9CT89.tmp\Soar Installer.tmp" /SL5="$40128,79072085,1088512,C:\Users\Admin\AppData\Local\Temp\Soar Installer.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2360
-