Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
02/02/2024, 06:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
88d3589b6480cf91687bf8f924dba5ce.exe
Resource
win7-20231129-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
88d3589b6480cf91687bf8f924dba5ce.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
88d3589b6480cf91687bf8f924dba5ce.exe
-
Size
42KB
-
MD5
88d3589b6480cf91687bf8f924dba5ce
-
SHA1
d525b43f148e5950f7f77ccbf1c98584acee5452
-
SHA256
4d523a5c4113980f196f56a9b18174f6eceda0e1ddd1a093862d8702f3c16478
-
SHA512
624e273410f3ef3b080d071a6d6fd5d851c6e54b1a8dac2af38c33b0eaee16f272eb5d4f9af67ec95e488f7e48784c4ba630d7f724f2277d310fa79726509151
-
SSDEEP
768:dzIXe/KSYbzMi5dIikLYtRblI+zIXX+nnCbfIeBcGwBUuzmraMmr1b:5I6KSYbzMidk6Rbl/CAG8Uum41
Score
7/10
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\t2oiyy1ii.exe 88d3589b6480cf91687bf8f924dba5ce.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\t2oiyy1ii.exe 88d3589b6480cf91687bf8f924dba5ce.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2980 set thread context of 2132 2980 88d3589b6480cf91687bf8f924dba5ce.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2132 88d3589b6480cf91687bf8f924dba5ce.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2132 2980 88d3589b6480cf91687bf8f924dba5ce.exe 28 PID 2980 wrote to memory of 2132 2980 88d3589b6480cf91687bf8f924dba5ce.exe 28 PID 2980 wrote to memory of 2132 2980 88d3589b6480cf91687bf8f924dba5ce.exe 28 PID 2980 wrote to memory of 2132 2980 88d3589b6480cf91687bf8f924dba5ce.exe 28 PID 2980 wrote to memory of 2132 2980 88d3589b6480cf91687bf8f924dba5ce.exe 28 PID 2980 wrote to memory of 2132 2980 88d3589b6480cf91687bf8f924dba5ce.exe 28 PID 2132 wrote to memory of 1344 2132 88d3589b6480cf91687bf8f924dba5ce.exe 7 PID 2132 wrote to memory of 1344 2132 88d3589b6480cf91687bf8f924dba5ce.exe 7 PID 2132 wrote to memory of 1344 2132 88d3589b6480cf91687bf8f924dba5ce.exe 7
Processes
-
C:\Users\Admin\AppData\Local\Temp\88d3589b6480cf91687bf8f924dba5ce.exe"C:\Users\Admin\AppData\Local\Temp\88d3589b6480cf91687bf8f924dba5ce.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\88d3589b6480cf91687bf8f924dba5ce.exe"C:\Users\Admin\AppData\Local\Temp\88d3589b6480cf91687bf8f924dba5ce.exe"2⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2132
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1344