Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 01:42
Behavioral task
behavioral1
Sample
47b33998ef4e57beb34ee2a8f1a6466d.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
47b33998ef4e57beb34ee2a8f1a6466d.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
47b33998ef4e57beb34ee2a8f1a6466d.exe
-
Size
53KB
-
MD5
47b33998ef4e57beb34ee2a8f1a6466d
-
SHA1
34cfe59fddf479b8b15a56e2a530141db434e59e
-
SHA256
c91af1f36a2009b0199b39c296396d0cd4cecad91d7d0e28dfd98de728ad0ea8
-
SHA512
23d085c01ee68b7cd87a60fea955839dffba051d2a5b6725ac7ca31c295883390a7cbe42bd70ed5dd8c3dc858a15b6b9ee1b53a8f9682e46d29cc805519b1f51
-
SSDEEP
1536:+NILhgs+xc5PtRDVjO2PT+3t0j4UOmk2jP+:+NIfPPxOdt/pmh+
Score
7/10
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2216 47b33998ef4e57beb34ee2a8f1a6466d.exe -
resource yara_rule behavioral1/memory/2240-1-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/2216-6-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/2240-3-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/2216-10-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\Unix_Sg.Jmp 47b33998ef4e57beb34ee2a8f1a6466d.exe File created C:\Program Files\Internet Explorer\Unix_Sg.Jmp 47b33998ef4e57beb34ee2a8f1a6466d.exe File created C:\Program Files\Internet Explorer\ftsKetNt.7ps 47b33998ef4e57beb34ee2a8f1a6466d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2216 47b33998ef4e57beb34ee2a8f1a6466d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2216 2240 47b33998ef4e57beb34ee2a8f1a6466d.exe 14 PID 2240 wrote to memory of 2216 2240 47b33998ef4e57beb34ee2a8f1a6466d.exe 14 PID 2240 wrote to memory of 2216 2240 47b33998ef4e57beb34ee2a8f1a6466d.exe 14 PID 2240 wrote to memory of 2216 2240 47b33998ef4e57beb34ee2a8f1a6466d.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\47b33998ef4e57beb34ee2a8f1a6466d.exe"C:\Users\Admin\AppData\Local\Temp\47b33998ef4e57beb34ee2a8f1a6466d.exe" x1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2216
-
C:\Users\Admin\AppData\Local\Temp\47b33998ef4e57beb34ee2a8f1a6466d.exe"C:\Users\Admin\AppData\Local\Temp\47b33998ef4e57beb34ee2a8f1a6466d.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2240