Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 00:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
550ab4b65c85ad5d252550fe51dc18e0.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
550ab4b65c85ad5d252550fe51dc18e0.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
550ab4b65c85ad5d252550fe51dc18e0.exe
-
Size
394KB
-
MD5
550ab4b65c85ad5d252550fe51dc18e0
-
SHA1
f385de5e091c7450ee2819dd177a676871ba5b53
-
SHA256
e2e83f1ebd6372895aa9246854b7fa9e9a7799af0a8472c11677ae489e45d18f
-
SHA512
d9352af0290913c7627e0839548d8c1c6a0b3094142f23073cd03b01ee3c168837f17ee1fb83d50f5f0df46c1e1201bd67370206660f75170956c6726d844df9
-
SSDEEP
6144:YujryfGr2CrQeZpAKpw+Uzk1Hlnw6PJTDpAXqYCUwoXWKraBCDoeA1r:Y0rQgDpp1FnhhTgVOKraBN
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3596 set thread context of 324 3596 550ab4b65c85ad5d252550fe51dc18e0.exe 30 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 324 550ab4b65c85ad5d252550fe51dc18e0.exe 324 550ab4b65c85ad5d252550fe51dc18e0.exe 324 550ab4b65c85ad5d252550fe51dc18e0.exe 324 550ab4b65c85ad5d252550fe51dc18e0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3596 550ab4b65c85ad5d252550fe51dc18e0.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3596 wrote to memory of 324 3596 550ab4b65c85ad5d252550fe51dc18e0.exe 30 PID 3596 wrote to memory of 324 3596 550ab4b65c85ad5d252550fe51dc18e0.exe 30 PID 3596 wrote to memory of 324 3596 550ab4b65c85ad5d252550fe51dc18e0.exe 30 PID 3596 wrote to memory of 324 3596 550ab4b65c85ad5d252550fe51dc18e0.exe 30 PID 3596 wrote to memory of 324 3596 550ab4b65c85ad5d252550fe51dc18e0.exe 30 PID 3596 wrote to memory of 324 3596 550ab4b65c85ad5d252550fe51dc18e0.exe 30 PID 3596 wrote to memory of 324 3596 550ab4b65c85ad5d252550fe51dc18e0.exe 30 PID 324 wrote to memory of 3500 324 550ab4b65c85ad5d252550fe51dc18e0.exe 49 PID 324 wrote to memory of 3500 324 550ab4b65c85ad5d252550fe51dc18e0.exe 49 PID 324 wrote to memory of 3500 324 550ab4b65c85ad5d252550fe51dc18e0.exe 49 PID 324 wrote to memory of 3500 324 550ab4b65c85ad5d252550fe51dc18e0.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\550ab4b65c85ad5d252550fe51dc18e0.exe"C:\Users\Admin\AppData\Local\Temp\550ab4b65c85ad5d252550fe51dc18e0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\550ab4b65c85ad5d252550fe51dc18e0.exe"C:\Users\Admin\AppData\Local\Temp\550ab4b65c85ad5d252550fe51dc18e0.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:324
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3500