Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 02:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
79010143243eda1de643bb3d49d16d2d.exe
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
79010143243eda1de643bb3d49d16d2d.exe
-
Size
123KB
-
MD5
79010143243eda1de643bb3d49d16d2d
-
SHA1
d0ff3634e007f00c3b49a179416e8c5d7155afbb
-
SHA256
4b844cf36afed61fdba88b1ac35ce8b6b56e52e61b756c2bb9690cd42ec27b60
-
SHA512
d1ab358e69cad856c1d6c1d60236857481362c3f9108538afb719e4c997fdc3a3b95dcc42ea53ed9ac314e218749f2c015dadf38a8662efc1df843a2e55ca22e
-
SSDEEP
3072:qp4QhJsxXYClfk6y6SyBgKGg/C2p6ztO73KpfsMhpqlA:LQhCpBOKQg3p6zQ7Wf22
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 79010143243eda1de643bb3d49d16d2d.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2384 set thread context of 1720 2384 79010143243eda1de643bb3d49d16d2d.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1720 79010143243eda1de643bb3d49d16d2d.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2384 wrote to memory of 1720 2384 79010143243eda1de643bb3d49d16d2d.exe 28 PID 2384 wrote to memory of 1720 2384 79010143243eda1de643bb3d49d16d2d.exe 28 PID 2384 wrote to memory of 1720 2384 79010143243eda1de643bb3d49d16d2d.exe 28 PID 2384 wrote to memory of 1720 2384 79010143243eda1de643bb3d49d16d2d.exe 28 PID 2384 wrote to memory of 1720 2384 79010143243eda1de643bb3d49d16d2d.exe 28 PID 2384 wrote to memory of 1720 2384 79010143243eda1de643bb3d49d16d2d.exe 28 PID 2384 wrote to memory of 1720 2384 79010143243eda1de643bb3d49d16d2d.exe 28 PID 2384 wrote to memory of 1720 2384 79010143243eda1de643bb3d49d16d2d.exe 28 PID 2384 wrote to memory of 1720 2384 79010143243eda1de643bb3d49d16d2d.exe 28 PID 2384 wrote to memory of 1720 2384 79010143243eda1de643bb3d49d16d2d.exe 28 PID 2384 wrote to memory of 1720 2384 79010143243eda1de643bb3d49d16d2d.exe 28 PID 1720 wrote to memory of 1256 1720 79010143243eda1de643bb3d49d16d2d.exe 20 PID 1720 wrote to memory of 1256 1720 79010143243eda1de643bb3d49d16d2d.exe 20 PID 1720 wrote to memory of 1256 1720 79010143243eda1de643bb3d49d16d2d.exe 20 PID 1720 wrote to memory of 1256 1720 79010143243eda1de643bb3d49d16d2d.exe 20 PID 1720 wrote to memory of 1256 1720 79010143243eda1de643bb3d49d16d2d.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\79010143243eda1de643bb3d49d16d2d.exe"C:\Users\Admin\AppData\Local\Temp\79010143243eda1de643bb3d49d16d2d.exe"2⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\79010143243eda1de643bb3d49d16d2d.exe"C:\Users\Admin\AppData\Local\Temp\79010143243eda1de643bb3d49d16d2d.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1720
-
-