Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 05:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
73cfc2c91d2808f32b8283717dceeb00.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
73cfc2c91d2808f32b8283717dceeb00.exe
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
73cfc2c91d2808f32b8283717dceeb00.exe
-
Size
80KB
-
MD5
73cfc2c91d2808f32b8283717dceeb00
-
SHA1
60ba6b63b986e184ab4fb4263648ecb67cb613bf
-
SHA256
d03936d39a6d7da6d88d2f01adb4da3280ef1454a32c6bb0d978fe24b40ec535
-
SHA512
5de0c1c80831a4dc685d603e6b1a2dce40aee88ff29074c8f608335714318dc1ac50aaf9327f33dd38fecc17ac40289bb9d95f59bbeb256b1958cfa01c1517fb
-
SSDEEP
1536:BvBWn1ky6/UEAuciCQAAtF2EGEvt9f2ATgD7t61f6i1:U1k5UL3ijFDvt9f2ATgDZ61R1
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2028 set thread context of 2216 2028 73cfc2c91d2808f32b8283717dceeb00.exe 28 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2028 73cfc2c91d2808f32b8283717dceeb00.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2216 2028 73cfc2c91d2808f32b8283717dceeb00.exe 28 PID 2028 wrote to memory of 2216 2028 73cfc2c91d2808f32b8283717dceeb00.exe 28 PID 2028 wrote to memory of 2216 2028 73cfc2c91d2808f32b8283717dceeb00.exe 28 PID 2028 wrote to memory of 2216 2028 73cfc2c91d2808f32b8283717dceeb00.exe 28 PID 2028 wrote to memory of 2216 2028 73cfc2c91d2808f32b8283717dceeb00.exe 28 PID 2028 wrote to memory of 2216 2028 73cfc2c91d2808f32b8283717dceeb00.exe 28 PID 2028 wrote to memory of 2216 2028 73cfc2c91d2808f32b8283717dceeb00.exe 28 PID 2028 wrote to memory of 2216 2028 73cfc2c91d2808f32b8283717dceeb00.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\73cfc2c91d2808f32b8283717dceeb00.exe"C:\Users\Admin\AppData\Local\Temp\73cfc2c91d2808f32b8283717dceeb00.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\73cfc2c91d2808f32b8283717dceeb00.exeC:\Users\Admin\AppData\Local\Temp\73cfc2c91d2808f32b8283717dceeb002⤵PID:2216
-