Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/02/2024, 22:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a085143720bf94ff257f030ab7bae1a0.exe
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
a085143720bf94ff257f030ab7bae1a0.exe
Resource
win10v2004-20240221-en
0 signatures
150 seconds
General
-
Target
a085143720bf94ff257f030ab7bae1a0.exe
-
Size
132KB
-
MD5
a085143720bf94ff257f030ab7bae1a0
-
SHA1
0d11f398c7d9e541d36aa830ed41d9df3ac2f6bf
-
SHA256
b02bc2a3fb209768e4ba648bdda0c60c223f97e9ab0003dfb09327a701bbfe30
-
SHA512
5a36012f8c80bfc07ed738ee5b7943c6711142054e0dc896cab52df309988a77545d256dc73afc603a9633497e490326fb419e5bb9fdff0b272b841d418220b2
-
SSDEEP
3072:a/geW/E67ELrciHTN+Fu/Ljlc1uW3mqOANSSnf90CE:aYQ6QLdTN/LRJmmQ/f90C
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2208 set thread context of 3048 2208 a085143720bf94ff257f030ab7bae1a0.exe 28 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2208 wrote to memory of 3048 2208 a085143720bf94ff257f030ab7bae1a0.exe 28 PID 2208 wrote to memory of 3048 2208 a085143720bf94ff257f030ab7bae1a0.exe 28 PID 2208 wrote to memory of 3048 2208 a085143720bf94ff257f030ab7bae1a0.exe 28 PID 2208 wrote to memory of 3048 2208 a085143720bf94ff257f030ab7bae1a0.exe 28 PID 2208 wrote to memory of 3048 2208 a085143720bf94ff257f030ab7bae1a0.exe 28 PID 2208 wrote to memory of 3048 2208 a085143720bf94ff257f030ab7bae1a0.exe 28 PID 2208 wrote to memory of 3048 2208 a085143720bf94ff257f030ab7bae1a0.exe 28 PID 2208 wrote to memory of 3048 2208 a085143720bf94ff257f030ab7bae1a0.exe 28 PID 2208 wrote to memory of 3048 2208 a085143720bf94ff257f030ab7bae1a0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a085143720bf94ff257f030ab7bae1a0.exe"C:\Users\Admin\AppData\Local\Temp\a085143720bf94ff257f030ab7bae1a0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\a085143720bf94ff257f030ab7bae1a0.exe"C:\Users\Admin\AppData\Local\Temp\a085143720bf94ff257f030ab7bae1a0.exe"2⤵PID:3048
-