Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 02:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
79010143243eda1de643bb3d49d16d2d.exe
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
79010143243eda1de643bb3d49d16d2d.exe
-
Size
123KB
-
MD5
79010143243eda1de643bb3d49d16d2d
-
SHA1
d0ff3634e007f00c3b49a179416e8c5d7155afbb
-
SHA256
4b844cf36afed61fdba88b1ac35ce8b6b56e52e61b756c2bb9690cd42ec27b60
-
SHA512
d1ab358e69cad856c1d6c1d60236857481362c3f9108538afb719e4c997fdc3a3b95dcc42ea53ed9ac314e218749f2c015dadf38a8662efc1df843a2e55ca22e
-
SSDEEP
3072:qp4QhJsxXYClfk6y6SyBgKGg/C2p6ztO73KpfsMhpqlA:LQhCpBOKQg3p6zQ7Wf22
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 79010143243eda1de643bb3d49d16d2d.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2684 set thread context of 2708 2684 79010143243eda1de643bb3d49d16d2d.exe 86 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2708 79010143243eda1de643bb3d49d16d2d.exe 2708 79010143243eda1de643bb3d49d16d2d.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2708 2684 79010143243eda1de643bb3d49d16d2d.exe 86 PID 2684 wrote to memory of 2708 2684 79010143243eda1de643bb3d49d16d2d.exe 86 PID 2684 wrote to memory of 2708 2684 79010143243eda1de643bb3d49d16d2d.exe 86 PID 2684 wrote to memory of 2708 2684 79010143243eda1de643bb3d49d16d2d.exe 86 PID 2684 wrote to memory of 2708 2684 79010143243eda1de643bb3d49d16d2d.exe 86 PID 2684 wrote to memory of 2708 2684 79010143243eda1de643bb3d49d16d2d.exe 86 PID 2684 wrote to memory of 2708 2684 79010143243eda1de643bb3d49d16d2d.exe 86 PID 2684 wrote to memory of 2708 2684 79010143243eda1de643bb3d49d16d2d.exe 86 PID 2684 wrote to memory of 2708 2684 79010143243eda1de643bb3d49d16d2d.exe 86 PID 2684 wrote to memory of 2708 2684 79010143243eda1de643bb3d49d16d2d.exe 86 PID 2708 wrote to memory of 3376 2708 79010143243eda1de643bb3d49d16d2d.exe 34 PID 2708 wrote to memory of 3376 2708 79010143243eda1de643bb3d49d16d2d.exe 34 PID 2708 wrote to memory of 3376 2708 79010143243eda1de643bb3d49d16d2d.exe 34 PID 2708 wrote to memory of 3376 2708 79010143243eda1de643bb3d49d16d2d.exe 34 PID 2708 wrote to memory of 3376 2708 79010143243eda1de643bb3d49d16d2d.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\79010143243eda1de643bb3d49d16d2d.exe"C:\Users\Admin\AppData\Local\Temp\79010143243eda1de643bb3d49d16d2d.exe"2⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\79010143243eda1de643bb3d49d16d2d.exe"C:\Users\Admin\AppData\Local\Temp\79010143243eda1de643bb3d49d16d2d.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2708
-
-