Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23/01/2024, 21:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7097231557184e207cf113bf5910368c.exe
Resource
win7-20231129-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
7097231557184e207cf113bf5910368c.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
7097231557184e207cf113bf5910368c.exe
-
Size
217KB
-
MD5
7097231557184e207cf113bf5910368c
-
SHA1
65da54019f144a6f0dc1f2a110f67048af0e40fb
-
SHA256
880f63ff66c4ff99951172543e5323318832a3cef3f61530c19311a8e84b6f5b
-
SHA512
241714c0b6199acf0362178f3ae1cd2e2606ce539dda7ce5e646c154227b36b59a4d746d50dc211f7163ac38b31a2587c8cc9eb0e70e7bfaa9f0f717bce26715
-
SSDEEP
3072:bnASUq6bJLRAoHXQlWjhe+7Cn2lMw+EDtP/YrP6f0IT+ktQnvD:zV+bJLRLuYhp+nCMw+Ctnhf0L8KD
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3228 set thread context of 4696 3228 7097231557184e207cf113bf5910368c.exe 86 PID 4696 set thread context of 2568 4696 7097231557184e207cf113bf5910368c.exe 88 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2568 7097231557184e207cf113bf5910368c.exe 2568 7097231557184e207cf113bf5910368c.exe 2568 7097231557184e207cf113bf5910368c.exe 2568 7097231557184e207cf113bf5910368c.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3228 7097231557184e207cf113bf5910368c.exe 4696 7097231557184e207cf113bf5910368c.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3228 wrote to memory of 4696 3228 7097231557184e207cf113bf5910368c.exe 86 PID 3228 wrote to memory of 4696 3228 7097231557184e207cf113bf5910368c.exe 86 PID 3228 wrote to memory of 4696 3228 7097231557184e207cf113bf5910368c.exe 86 PID 3228 wrote to memory of 4696 3228 7097231557184e207cf113bf5910368c.exe 86 PID 3228 wrote to memory of 4696 3228 7097231557184e207cf113bf5910368c.exe 86 PID 3228 wrote to memory of 4696 3228 7097231557184e207cf113bf5910368c.exe 86 PID 3228 wrote to memory of 4696 3228 7097231557184e207cf113bf5910368c.exe 86 PID 3228 wrote to memory of 4696 3228 7097231557184e207cf113bf5910368c.exe 86 PID 4696 wrote to memory of 2568 4696 7097231557184e207cf113bf5910368c.exe 88 PID 4696 wrote to memory of 2568 4696 7097231557184e207cf113bf5910368c.exe 88 PID 4696 wrote to memory of 2568 4696 7097231557184e207cf113bf5910368c.exe 88 PID 4696 wrote to memory of 2568 4696 7097231557184e207cf113bf5910368c.exe 88 PID 4696 wrote to memory of 2568 4696 7097231557184e207cf113bf5910368c.exe 88 PID 4696 wrote to memory of 2568 4696 7097231557184e207cf113bf5910368c.exe 88 PID 4696 wrote to memory of 2568 4696 7097231557184e207cf113bf5910368c.exe 88 PID 2568 wrote to memory of 3556 2568 7097231557184e207cf113bf5910368c.exe 55 PID 2568 wrote to memory of 3556 2568 7097231557184e207cf113bf5910368c.exe 55 PID 2568 wrote to memory of 3556 2568 7097231557184e207cf113bf5910368c.exe 55 PID 2568 wrote to memory of 3556 2568 7097231557184e207cf113bf5910368c.exe 55
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\7097231557184e207cf113bf5910368c.exe"C:\Users\Admin\AppData\Local\Temp\7097231557184e207cf113bf5910368c.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\7097231557184e207cf113bf5910368c.exeC:\Users\Admin\AppData\Local\Temp\7097231557184e207cf113bf5910368c.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\7097231557184e207cf113bf5910368c.exeC:\Users\Admin\AppData\Local\Temp\7097231557184e207cf113bf5910368c.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2568
-
-
-