Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 12:18
Static task
static1
Behavioral task
behavioral1
Sample
829006b335b31999c9d78a621e612ca27799f140c47c19a9291e6f0a14339229.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
829006b335b31999c9d78a621e612ca27799f140c47c19a9291e6f0a14339229.exe
Resource
win10v2004-20240412-en
General
-
Target
829006b335b31999c9d78a621e612ca27799f140c47c19a9291e6f0a14339229.exe
-
Size
3.8MB
-
MD5
da4894fba480455a97c4d09f14e084c8
-
SHA1
199fcfcf728d0343f4dbe86f49fa1c197f91afdf
-
SHA256
829006b335b31999c9d78a621e612ca27799f140c47c19a9291e6f0a14339229
-
SHA512
0f2c1a39b5f06ac1fc73a6e1103715d6537ecb892392260d6794a69cc6bebaeffda800a7c9ebf27bde93bf17974c27fec8a1b0b7d61b90fc3a2e9014c2103bb4
-
SSDEEP
49152:+D8DI/sw7bifA/RXXYHnwVoQFMB4zSJNVI86QULF146Lb8hDoLDTD6VQZ:xM/swCo/hbFqB4OVyxLX46go3TD6VQ
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1532-0-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral2/memory/1532-2-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral2/memory/1532-4-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral2/memory/1532-6-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral2/memory/1532-8-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral2/memory/1532-10-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral2/memory/1532-12-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral2/memory/1532-14-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral2/memory/1532-17-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral2/memory/1532-19-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral2/memory/1532-21-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral2/memory/1532-23-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral2/memory/1532-25-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral2/memory/1532-27-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral2/memory/1532-29-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral2/memory/1532-31-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral2/memory/1532-33-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral2/memory/1532-35-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral2/memory/1532-37-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral2/memory/1532-39-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral2/memory/1532-41-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral2/memory/1532-43-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral2/memory/1532-44-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral2/memory/1532-45-0x0000000010000000-0x0000000010038000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1532 829006b335b31999c9d78a621e612ca27799f140c47c19a9291e6f0a14339229.exe 1532 829006b335b31999c9d78a621e612ca27799f140c47c19a9291e6f0a14339229.exe 1532 829006b335b31999c9d78a621e612ca27799f140c47c19a9291e6f0a14339229.exe 1532 829006b335b31999c9d78a621e612ca27799f140c47c19a9291e6f0a14339229.exe