Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
23/01/2024, 21:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7097231557184e207cf113bf5910368c.exe
Resource
win7-20231129-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
7097231557184e207cf113bf5910368c.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
7097231557184e207cf113bf5910368c.exe
-
Size
217KB
-
MD5
7097231557184e207cf113bf5910368c
-
SHA1
65da54019f144a6f0dc1f2a110f67048af0e40fb
-
SHA256
880f63ff66c4ff99951172543e5323318832a3cef3f61530c19311a8e84b6f5b
-
SHA512
241714c0b6199acf0362178f3ae1cd2e2606ce539dda7ce5e646c154227b36b59a4d746d50dc211f7163ac38b31a2587c8cc9eb0e70e7bfaa9f0f717bce26715
-
SSDEEP
3072:bnASUq6bJLRAoHXQlWjhe+7Cn2lMw+EDtP/YrP6f0IT+ktQnvD:zV+bJLRLuYhp+nCMw+Ctnhf0L8KD
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1656 set thread context of 3024 1656 7097231557184e207cf113bf5910368c.exe 28 PID 3024 set thread context of 2192 3024 7097231557184e207cf113bf5910368c.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2192 7097231557184e207cf113bf5910368c.exe 2192 7097231557184e207cf113bf5910368c.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1656 7097231557184e207cf113bf5910368c.exe 3024 7097231557184e207cf113bf5910368c.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1656 wrote to memory of 3024 1656 7097231557184e207cf113bf5910368c.exe 28 PID 1656 wrote to memory of 3024 1656 7097231557184e207cf113bf5910368c.exe 28 PID 1656 wrote to memory of 3024 1656 7097231557184e207cf113bf5910368c.exe 28 PID 1656 wrote to memory of 3024 1656 7097231557184e207cf113bf5910368c.exe 28 PID 1656 wrote to memory of 3024 1656 7097231557184e207cf113bf5910368c.exe 28 PID 1656 wrote to memory of 3024 1656 7097231557184e207cf113bf5910368c.exe 28 PID 1656 wrote to memory of 3024 1656 7097231557184e207cf113bf5910368c.exe 28 PID 1656 wrote to memory of 3024 1656 7097231557184e207cf113bf5910368c.exe 28 PID 1656 wrote to memory of 3024 1656 7097231557184e207cf113bf5910368c.exe 28 PID 3024 wrote to memory of 2192 3024 7097231557184e207cf113bf5910368c.exe 29 PID 3024 wrote to memory of 2192 3024 7097231557184e207cf113bf5910368c.exe 29 PID 3024 wrote to memory of 2192 3024 7097231557184e207cf113bf5910368c.exe 29 PID 3024 wrote to memory of 2192 3024 7097231557184e207cf113bf5910368c.exe 29 PID 3024 wrote to memory of 2192 3024 7097231557184e207cf113bf5910368c.exe 29 PID 3024 wrote to memory of 2192 3024 7097231557184e207cf113bf5910368c.exe 29 PID 3024 wrote to memory of 2192 3024 7097231557184e207cf113bf5910368c.exe 29 PID 3024 wrote to memory of 2192 3024 7097231557184e207cf113bf5910368c.exe 29 PID 2192 wrote to memory of 1368 2192 7097231557184e207cf113bf5910368c.exe 18 PID 2192 wrote to memory of 1368 2192 7097231557184e207cf113bf5910368c.exe 18 PID 2192 wrote to memory of 1368 2192 7097231557184e207cf113bf5910368c.exe 18 PID 2192 wrote to memory of 1368 2192 7097231557184e207cf113bf5910368c.exe 18
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\7097231557184e207cf113bf5910368c.exe"C:\Users\Admin\AppData\Local\Temp\7097231557184e207cf113bf5910368c.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\7097231557184e207cf113bf5910368c.exeC:\Users\Admin\AppData\Local\Temp\7097231557184e207cf113bf5910368c.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\7097231557184e207cf113bf5910368c.exeC:\Users\Admin\AppData\Local\Temp\7097231557184e207cf113bf5910368c.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2192
-
-
-