Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 09:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
50354a2472789f846b288f206f443c19.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
50354a2472789f846b288f206f443c19.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
50354a2472789f846b288f206f443c19.exe
-
Size
45KB
-
MD5
50354a2472789f846b288f206f443c19
-
SHA1
960009816e11497ae5ad13538b21ab2d88397f04
-
SHA256
9e6159308007165eea4fa42efbb015877ad28d715b14fdc3f9db20378e92d5e8
-
SHA512
5d697e86c8c310401e50ef5462a0cd0c001cc20642c712601c4f7a40dceb40210645a1b598bce496310279a0e7b8cd0d3d85ddb8fee67cfcd259e899f40a2c6a
-
SSDEEP
768:Vu0DuqO8+S9aZG8uuwfsaZsZTYPB6sqtB/ZenFHmQWFon67uWLNvhaUg2n7M:jD0Bkpzf2WPws6gFGQWFofAJfXM
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1472 set thread context of 2344 1472 50354a2472789f846b288f206f443c19.exe 14 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1472 wrote to memory of 2344 1472 50354a2472789f846b288f206f443c19.exe 14 PID 1472 wrote to memory of 2344 1472 50354a2472789f846b288f206f443c19.exe 14 PID 1472 wrote to memory of 2344 1472 50354a2472789f846b288f206f443c19.exe 14 PID 1472 wrote to memory of 2344 1472 50354a2472789f846b288f206f443c19.exe 14 PID 1472 wrote to memory of 2344 1472 50354a2472789f846b288f206f443c19.exe 14 PID 1472 wrote to memory of 2344 1472 50354a2472789f846b288f206f443c19.exe 14 PID 1472 wrote to memory of 2344 1472 50354a2472789f846b288f206f443c19.exe 14 PID 1472 wrote to memory of 2344 1472 50354a2472789f846b288f206f443c19.exe 14 PID 1472 wrote to memory of 2344 1472 50354a2472789f846b288f206f443c19.exe 14 PID 1472 wrote to memory of 2344 1472 50354a2472789f846b288f206f443c19.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\50354a2472789f846b288f206f443c19.exe"C:\Users\Admin\AppData\Local\Temp\50354a2472789f846b288f206f443c19.exe"1⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\50354a2472789f846b288f206f443c19.exe"C:\Users\Admin\AppData\Local\Temp\50354a2472789f846b288f206f443c19.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1472