Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 06:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
10a19a24b85b92b6db99e621ced3105f.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
10a19a24b85b92b6db99e621ced3105f.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
10a19a24b85b92b6db99e621ced3105f.exe
-
Size
75KB
-
MD5
10a19a24b85b92b6db99e621ced3105f
-
SHA1
05f343db557a45acd10d48de0e30f9d5c56b66c8
-
SHA256
7de89fb16ce5ee15c0e08f2bda92f7b1959a4e6d8c9a3f08dd71d283b166d2a8
-
SHA512
e618b75991b784eecfb676922702580110dbe23baa9b426adcad244ca610104092550ee0155c991721dd28b0f6d38447c0e3280de90d0bb69d76142c542fdbbb
-
SSDEEP
1536:MMH4MuWfzzeI0HBIfqW8jJVY+6XFN0Giz4cPu7soOU:oMtfPeI2OtYSXFN0G24Wfs
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2144 set thread context of 2856 2144 10a19a24b85b92b6db99e621ced3105f.exe 27 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2856 2144 10a19a24b85b92b6db99e621ced3105f.exe 27 PID 2144 wrote to memory of 2856 2144 10a19a24b85b92b6db99e621ced3105f.exe 27 PID 2144 wrote to memory of 2856 2144 10a19a24b85b92b6db99e621ced3105f.exe 27 PID 2144 wrote to memory of 2856 2144 10a19a24b85b92b6db99e621ced3105f.exe 27 PID 2144 wrote to memory of 2856 2144 10a19a24b85b92b6db99e621ced3105f.exe 27 PID 2144 wrote to memory of 2856 2144 10a19a24b85b92b6db99e621ced3105f.exe 27 PID 2144 wrote to memory of 2856 2144 10a19a24b85b92b6db99e621ced3105f.exe 27 PID 2144 wrote to memory of 2856 2144 10a19a24b85b92b6db99e621ced3105f.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\10a19a24b85b92b6db99e621ced3105f.exe"C:\Users\Admin\AppData\Local\Temp\10a19a24b85b92b6db99e621ced3105f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\10a19a24b85b92b6db99e621ced3105f.exe"C:\Users\Admin\AppData\Local\Temp\10a19a24b85b92b6db99e621ced3105f.exe"2⤵PID:2856
-