Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 19:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7dc59989f2d0775bb83c499047a1d626.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
7dc59989f2d0775bb83c499047a1d626.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
7dc59989f2d0775bb83c499047a1d626.exe
-
Size
55KB
-
MD5
7dc59989f2d0775bb83c499047a1d626
-
SHA1
a3a9ce3d50e247bf3f9503db3ea921fd027e584d
-
SHA256
0c8c89bd9ad736608407b45960437a7ba8e9654f74ad1bc8cc05660b44d7fdad
-
SHA512
db5b6e4fc5dad1ba863beff3d5787095a13521a70414b696514dc9d436310819f18dc50abb32d2866a6ee127bc5764891cd3a113345f7a789063567271b0e4c7
-
SSDEEP
768:gkw5yeww45SX5wPGuL482mjdiSk9J4cbmCNjE1mkOt1GV6xCkV:gsewhSX5Yg82mQrJdN41mkO/G60kV
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2112 set thread context of 2044 2112 7dc59989f2d0775bb83c499047a1d626.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2044 7dc59989f2d0775bb83c499047a1d626.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2112 7dc59989f2d0775bb83c499047a1d626.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2044 2112 7dc59989f2d0775bb83c499047a1d626.exe 28 PID 2112 wrote to memory of 2044 2112 7dc59989f2d0775bb83c499047a1d626.exe 28 PID 2112 wrote to memory of 2044 2112 7dc59989f2d0775bb83c499047a1d626.exe 28 PID 2112 wrote to memory of 2044 2112 7dc59989f2d0775bb83c499047a1d626.exe 28 PID 2112 wrote to memory of 2044 2112 7dc59989f2d0775bb83c499047a1d626.exe 28 PID 2112 wrote to memory of 2044 2112 7dc59989f2d0775bb83c499047a1d626.exe 28 PID 2112 wrote to memory of 2044 2112 7dc59989f2d0775bb83c499047a1d626.exe 28 PID 2112 wrote to memory of 2044 2112 7dc59989f2d0775bb83c499047a1d626.exe 28 PID 2044 wrote to memory of 1220 2044 7dc59989f2d0775bb83c499047a1d626.exe 10 PID 2044 wrote to memory of 1220 2044 7dc59989f2d0775bb83c499047a1d626.exe 10 PID 2044 wrote to memory of 1220 2044 7dc59989f2d0775bb83c499047a1d626.exe 10 PID 2044 wrote to memory of 1220 2044 7dc59989f2d0775bb83c499047a1d626.exe 10 PID 2044 wrote to memory of 1220 2044 7dc59989f2d0775bb83c499047a1d626.exe 10 PID 2044 wrote to memory of 1220 2044 7dc59989f2d0775bb83c499047a1d626.exe 10
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\7dc59989f2d0775bb83c499047a1d626.exe"C:\Users\Admin\AppData\Local\Temp\7dc59989f2d0775bb83c499047a1d626.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\7dc59989f2d0775bb83c499047a1d626.exeC:\Users\Admin\AppData\Local\Temp\7dc59989f2d0775bb83c499047a1d626.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2044
-
-