Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/02/2024, 05:16
Behavioral task
behavioral1
Sample
88a6ce9b0f91c666531024957298efb2.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
88a6ce9b0f91c666531024957298efb2.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
88a6ce9b0f91c666531024957298efb2.exe
-
Size
55KB
-
MD5
88a6ce9b0f91c666531024957298efb2
-
SHA1
b80d63d0a34f815ce21de08c9285994192a276fd
-
SHA256
618a3e8104c32a9f840c7879a795d77aba89804a69681c629d2065471f9dbdbc
-
SHA512
3bb0652985b4bec452b6fb7e3e2943e9e427570ef9e7e64a7d32e704a4346dd757299b2703526c4a78574cbd3c0c8a782e82df2d3584dca4d34247acf91ff246
-
SSDEEP
1536:ZdxtHvczlNVceuiqPO9ptt7IV5lwIPM+0LJ6pga:BtH5iqPmptCVLPOI
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1672 set thread context of 2872 1672 88a6ce9b0f91c666531024957298efb2.exe 28 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1672 88a6ce9b0f91c666531024957298efb2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2872 1672 88a6ce9b0f91c666531024957298efb2.exe 28 PID 1672 wrote to memory of 2872 1672 88a6ce9b0f91c666531024957298efb2.exe 28 PID 1672 wrote to memory of 2872 1672 88a6ce9b0f91c666531024957298efb2.exe 28 PID 1672 wrote to memory of 2872 1672 88a6ce9b0f91c666531024957298efb2.exe 28 PID 1672 wrote to memory of 2872 1672 88a6ce9b0f91c666531024957298efb2.exe 28 PID 1672 wrote to memory of 2872 1672 88a6ce9b0f91c666531024957298efb2.exe 28 PID 1672 wrote to memory of 2872 1672 88a6ce9b0f91c666531024957298efb2.exe 28 PID 1672 wrote to memory of 2872 1672 88a6ce9b0f91c666531024957298efb2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\88a6ce9b0f91c666531024957298efb2.exe"C:\Users\Admin\AppData\Local\Temp\88a6ce9b0f91c666531024957298efb2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\88a6ce9b0f91c666531024957298efb2.EXE"C:\Users\Admin\AppData\Local\Temp\88a6ce9b0f91c666531024957298efb2.EXE"2⤵PID:2872
-