Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 13:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d63d39701226a35e27f8c660ef5d8edf.exe
Resource
win7-20231129-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
d63d39701226a35e27f8c660ef5d8edf.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
d63d39701226a35e27f8c660ef5d8edf.exe
-
Size
208KB
-
MD5
d63d39701226a35e27f8c660ef5d8edf
-
SHA1
c3533a33e888e9aff1ee976c5c6a6b782146a0f3
-
SHA256
2d7fa8aaa8464fa8e33585a2ab47cfeddbdf2822baefb7cca61d33617879ee51
-
SHA512
6841c7f951ca2e09dd8108f94d18bdb5bca9e55a273c019c89e4feff48013bf8d1fd5e3fb2518e3e8f3325f6bd8108b7d7d5f24e1ab8759d764406511a8059f9
-
SSDEEP
3072:5qwCsowFS0bPwJa3rYtD6QaL0qixPbnz03lk/3eY0kUPxF29BepIUOaOdphRoWst:pbosS0bPwJAUtD6nKxbn9O/kU3YpLot
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1632 set thread context of 2052 1632 d63d39701226a35e27f8c660ef5d8edf.exe 87 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2052 d63d39701226a35e27f8c660ef5d8edf.exe 2052 d63d39701226a35e27f8c660ef5d8edf.exe 2052 d63d39701226a35e27f8c660ef5d8edf.exe 2052 d63d39701226a35e27f8c660ef5d8edf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1632 d63d39701226a35e27f8c660ef5d8edf.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1632 wrote to memory of 2052 1632 d63d39701226a35e27f8c660ef5d8edf.exe 87 PID 1632 wrote to memory of 2052 1632 d63d39701226a35e27f8c660ef5d8edf.exe 87 PID 1632 wrote to memory of 2052 1632 d63d39701226a35e27f8c660ef5d8edf.exe 87 PID 1632 wrote to memory of 2052 1632 d63d39701226a35e27f8c660ef5d8edf.exe 87 PID 1632 wrote to memory of 2052 1632 d63d39701226a35e27f8c660ef5d8edf.exe 87 PID 1632 wrote to memory of 2052 1632 d63d39701226a35e27f8c660ef5d8edf.exe 87 PID 1632 wrote to memory of 2052 1632 d63d39701226a35e27f8c660ef5d8edf.exe 87 PID 2052 wrote to memory of 3352 2052 d63d39701226a35e27f8c660ef5d8edf.exe 55 PID 2052 wrote to memory of 3352 2052 d63d39701226a35e27f8c660ef5d8edf.exe 55 PID 2052 wrote to memory of 3352 2052 d63d39701226a35e27f8c660ef5d8edf.exe 55 PID 2052 wrote to memory of 3352 2052 d63d39701226a35e27f8c660ef5d8edf.exe 55
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\d63d39701226a35e27f8c660ef5d8edf.exe"C:\Users\Admin\AppData\Local\Temp\d63d39701226a35e27f8c660ef5d8edf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\d63d39701226a35e27f8c660ef5d8edf.exeC:\Users\Admin\AppData\Local\Temp\d63d39701226a35e27f8c660ef5d8edf.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2052
-
-