Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 13:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d63d39701226a35e27f8c660ef5d8edf.exe
Resource
win7-20231129-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
d63d39701226a35e27f8c660ef5d8edf.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
d63d39701226a35e27f8c660ef5d8edf.exe
-
Size
208KB
-
MD5
d63d39701226a35e27f8c660ef5d8edf
-
SHA1
c3533a33e888e9aff1ee976c5c6a6b782146a0f3
-
SHA256
2d7fa8aaa8464fa8e33585a2ab47cfeddbdf2822baefb7cca61d33617879ee51
-
SHA512
6841c7f951ca2e09dd8108f94d18bdb5bca9e55a273c019c89e4feff48013bf8d1fd5e3fb2518e3e8f3325f6bd8108b7d7d5f24e1ab8759d764406511a8059f9
-
SSDEEP
3072:5qwCsowFS0bPwJa3rYtD6QaL0qixPbnz03lk/3eY0kUPxF29BepIUOaOdphRoWst:pbosS0bPwJAUtD6nKxbn9O/kU3YpLot
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2820 set thread context of 2184 2820 d63d39701226a35e27f8c660ef5d8edf.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2184 d63d39701226a35e27f8c660ef5d8edf.exe 2184 d63d39701226a35e27f8c660ef5d8edf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2820 d63d39701226a35e27f8c660ef5d8edf.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2184 2820 d63d39701226a35e27f8c660ef5d8edf.exe 28 PID 2820 wrote to memory of 2184 2820 d63d39701226a35e27f8c660ef5d8edf.exe 28 PID 2820 wrote to memory of 2184 2820 d63d39701226a35e27f8c660ef5d8edf.exe 28 PID 2820 wrote to memory of 2184 2820 d63d39701226a35e27f8c660ef5d8edf.exe 28 PID 2820 wrote to memory of 2184 2820 d63d39701226a35e27f8c660ef5d8edf.exe 28 PID 2820 wrote to memory of 2184 2820 d63d39701226a35e27f8c660ef5d8edf.exe 28 PID 2820 wrote to memory of 2184 2820 d63d39701226a35e27f8c660ef5d8edf.exe 28 PID 2820 wrote to memory of 2184 2820 d63d39701226a35e27f8c660ef5d8edf.exe 28 PID 2184 wrote to memory of 1348 2184 d63d39701226a35e27f8c660ef5d8edf.exe 21 PID 2184 wrote to memory of 1348 2184 d63d39701226a35e27f8c660ef5d8edf.exe 21 PID 2184 wrote to memory of 1348 2184 d63d39701226a35e27f8c660ef5d8edf.exe 21 PID 2184 wrote to memory of 1348 2184 d63d39701226a35e27f8c660ef5d8edf.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\d63d39701226a35e27f8c660ef5d8edf.exe"C:\Users\Admin\AppData\Local\Temp\d63d39701226a35e27f8c660ef5d8edf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\d63d39701226a35e27f8c660ef5d8edf.exeC:\Users\Admin\AppData\Local\Temp\d63d39701226a35e27f8c660ef5d8edf.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2184
-
-