Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
12a2b6c279a648577e1ce5fa1a35afc3.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
12a2b6c279a648577e1ce5fa1a35afc3.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
12a2b6c279a648577e1ce5fa1a35afc3.exe
-
Size
604KB
-
MD5
12a2b6c279a648577e1ce5fa1a35afc3
-
SHA1
d9f25ad9e5705246278df8aab3762c0a5be7fc64
-
SHA256
3e8b1ea84ad2d991323a9df69f5bedece5252c0f7cb83139a25f9441ca98a131
-
SHA512
36444c069c0763c22f06ab71570eb9818db937c978324a94610dbc37a3362ddbb4596cee4e75415c8193dcb02bdb721c6e197dd82590ad8eb85280e16283dcfe
-
SSDEEP
12288:iTC7O4L2AudlNj0E852PaPuou8UYYZY/BwTDKlu/cQ/4M:iTCK4L0Nj0l5x1u8IZYpwTDKlu/cs
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2348 12a2b6c279a648577e1ce5fa1a35afc3.exe 2148 12a2b6c279a648577e1ce5fa1a35afc3.exe 2936 12a2b6c279a648577e1ce5fa1a35afc3.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2936 2348 12a2b6c279a648577e1ce5fa1a35afc3.exe 30 PID 2348 wrote to memory of 2936 2348 12a2b6c279a648577e1ce5fa1a35afc3.exe 30 PID 2348 wrote to memory of 2936 2348 12a2b6c279a648577e1ce5fa1a35afc3.exe 30 PID 2348 wrote to memory of 2936 2348 12a2b6c279a648577e1ce5fa1a35afc3.exe 30 PID 2348 wrote to memory of 2148 2348 12a2b6c279a648577e1ce5fa1a35afc3.exe 29 PID 2348 wrote to memory of 2148 2348 12a2b6c279a648577e1ce5fa1a35afc3.exe 29 PID 2348 wrote to memory of 2148 2348 12a2b6c279a648577e1ce5fa1a35afc3.exe 29 PID 2348 wrote to memory of 2148 2348 12a2b6c279a648577e1ce5fa1a35afc3.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\12a2b6c279a648577e1ce5fa1a35afc3.exe"C:\Users\Admin\AppData\Local\Temp\12a2b6c279a648577e1ce5fa1a35afc3.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\12a2b6c279a648577e1ce5fa1a35afc3.exewatch2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2148
-
-
C:\Users\Admin\AppData\Local\Temp\12a2b6c279a648577e1ce5fa1a35afc3.exestart2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2936
-