Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/01/2024, 10:20
Static task
static1
Behavioral task
behavioral1
Sample
7b133c2d7fecd74d1681c20d72097cc524e4cec754de0666cfb97f0f7f1e643c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7b133c2d7fecd74d1681c20d72097cc524e4cec754de0666cfb97f0f7f1e643c.exe
Resource
win10v2004-20231215-en
General
-
Target
7b133c2d7fecd74d1681c20d72097cc524e4cec754de0666cfb97f0f7f1e643c.exe
-
Size
4.0MB
-
MD5
d3e2dc79e072290ac2fcec171ab856ba
-
SHA1
22484fa37fc0708d3939ca1cfeb69a989ba9516c
-
SHA256
7b133c2d7fecd74d1681c20d72097cc524e4cec754de0666cfb97f0f7f1e643c
-
SHA512
8beb7ba56c518efe6d18de050b20bafb7b6588aee7e0e408188cca11a2a94f3b15c1ab50730ba643c8ba11ec0fc0e65d773db94306ac0116b57d2052f607baf9
-
SSDEEP
98304:sPoaPoXAGXM9pDPdLhe4Tz/7Dy2ZNImMXSlUcPnqkWv:lwLhZvfumMbcPnOv
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2072-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2072-52-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2072 7b133c2d7fecd74d1681c20d72097cc524e4cec754de0666cfb97f0f7f1e643c.exe 2072 7b133c2d7fecd74d1681c20d72097cc524e4cec754de0666cfb97f0f7f1e643c.exe 2072 7b133c2d7fecd74d1681c20d72097cc524e4cec754de0666cfb97f0f7f1e643c.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128B
MD53189d89f2ca26b478f534497ee273d7a
SHA1720757d282c3157dea1a96db61c6c8ab5fb13e25
SHA256ad2a5348d5021dffc1e5b23c028f1c5137d3b797b276061a4b7a189507321e9b
SHA5129d1ae5a339a7cba4d7c92ff5087282c529ada105258d1d9f62522e35868cd20ccc8a8bd920c1bbdf4ab7fdc4b50c7c93a6ad7646df07da28e856721e0b052416
-
Filesize
138B
MD56bbae0d20ca6b1c4a39040df3c338aea
SHA1a393b6c0740e5c59319a45b0c70c29e10ef237cd
SHA25656ccfe39a9f25beb57aca007872a6908094a5749b1a7b9ed6ade67c3f419d005
SHA51267df823ef24313452419fd5fb0ea283c139c025ce0df9d9209f49c40e18f5b10b72358c48afeef5f1cc7b3de227bd2def6797fea18e769b64887913ac75d5422
-
Filesize
126B
MD53f94bf73fb995217e1f94644fb76c057
SHA138ff75dc75d0ab0d06b83094f05a81e55742198d
SHA256da6f7f23cb44144a8d7a59c36a6ffa7e9a4192f03a29499449c19cebb9f0ff18
SHA51294d334c8a5e2203f1fd5a03d5927924a9de64dee8f0bfa910b68ec1b7e29535e6343ed7a00785acd7eb08ce4839d8c846c2c839f45ad9f74caba864edc9866af