Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
10s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 14:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Reversed.exe
Resource
win7-20231129-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
Reversed.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
Reversed.exe
-
Size
640KB
-
MD5
625964eb5cf0fdc1d5b77666359a8dd5
-
SHA1
3d8daa1734db83eb1f3cfa85a349c3da4a6bb4aa
-
SHA256
611fd5b9d018315c80b4e858948220df8c31ec01af88b616d46c7b00ed9e4a96
-
SHA512
9b1d3cf96c5056a69325a3374f569b608ab2e788cdaf29739c09d425df8d403669216e93292c7cac403baa87d7e5fb139fd3a9375ff7b54c22decc133aa128a0
-
SSDEEP
12288:fsbxmVj6hhwcxc0XW1kescUbHykjksx2BwdEYRgxrxJEaqr:fsAVj6hecenscUbS3u2qEYRKrxJEn
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe 4772 Reversed.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4772 wrote to memory of 3632 4772 Reversed.exe 101 PID 4772 wrote to memory of 3632 4772 Reversed.exe 101 PID 3632 wrote to memory of 3932 3632 cmd.exe 98 PID 3632 wrote to memory of 3932 3632 cmd.exe 98 PID 3632 wrote to memory of 4756 3632 cmd.exe 100 PID 3632 wrote to memory of 4756 3632 cmd.exe 100 PID 3632 wrote to memory of 3652 3632 cmd.exe 99 PID 3632 wrote to memory of 3652 3632 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\Reversed.exe"C:\Users\Admin\AppData\Local\Temp\Reversed.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Reversed.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:3632
-
-
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Reversed.exe" MD51⤵PID:3932
-
C:\Windows\system32\find.exefind /i /v "certutil"1⤵PID:3652
-
C:\Windows\system32\find.exefind /i /v "md5"1⤵PID:4756