Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 20:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
bcc7b2f483551043ee3933b57c183afb.exe
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
bcc7b2f483551043ee3933b57c183afb.exe
Resource
win10v2004-20240226-en
3 signatures
150 seconds
General
-
Target
bcc7b2f483551043ee3933b57c183afb.exe
-
Size
308KB
-
MD5
bcc7b2f483551043ee3933b57c183afb
-
SHA1
0788da590e0d59b4389bc5c7ad6b07dfa8518704
-
SHA256
7773d96c1b355d97e74fb5b8f7a9873302f5f276f5b1459f01950fb282d2fc24
-
SHA512
323b022a125ad3c2ff9e713388f03ca21fc4f6b30e32a0a8883acc7f36a90bf3765f06eed2d787a3c3cc2f0fef697910f35d0156aff10bd1f290a59f39f2529e
-
SSDEEP
3072:7h5PDykj37x2hypK7D6zdX3+P+kdMTzgo5NnyfiV9hgOlOfR68DaHI4Wa9xDTY9V:kofxgOltBeOxHYfH/VnyJFwUS47Tnbm
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4924 set thread context of 328 4924 bcc7b2f483551043ee3933b57c183afb.exe 90 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4924 bcc7b2f483551043ee3933b57c183afb.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4924 wrote to memory of 328 4924 bcc7b2f483551043ee3933b57c183afb.exe 90 PID 4924 wrote to memory of 328 4924 bcc7b2f483551043ee3933b57c183afb.exe 90 PID 4924 wrote to memory of 328 4924 bcc7b2f483551043ee3933b57c183afb.exe 90 PID 4924 wrote to memory of 328 4924 bcc7b2f483551043ee3933b57c183afb.exe 90 PID 4924 wrote to memory of 328 4924 bcc7b2f483551043ee3933b57c183afb.exe 90 PID 4924 wrote to memory of 328 4924 bcc7b2f483551043ee3933b57c183afb.exe 90 PID 4924 wrote to memory of 328 4924 bcc7b2f483551043ee3933b57c183afb.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcc7b2f483551043ee3933b57c183afb.exe"C:\Users\Admin\AppData\Local\Temp\bcc7b2f483551043ee3933b57c183afb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\bcc7b2f483551043ee3933b57c183afb.exeC:\Users\Admin\AppData\Local\Temp\bcc7b2f483551043ee3933b57c183afb.exe2⤵PID:328
-