Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/04/2024, 07:13
Static task
static1
Behavioral task
behavioral1
Sample
PO0424024.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
PO0424024.exe
Resource
win10v2004-20240226-en
6 signatures
150 seconds
General
-
Target
PO0424024.exe
-
Size
814KB
-
MD5
192be7ac2833574aafeeea8e0cd52380
-
SHA1
264298e6ebda222d48c0185c1ad168c51c0dc133
-
SHA256
19640f20d067c8ca1ba3e08d34ea493c05b99016c6608dbcbfdf848ca4d60452
-
SHA512
3301b3f0e8f8f71de13cdf22dee89cfa1a74f6df0e1831018a2bf2725977edbccdb8b4baddb0ec8288a7faafb979a8040ce5bdb9ffababb40a039d2b657edd9f
-
SSDEEP
24576:1R1WMVUu9FCfSwNZAXJ7oaOJdF+mJ312Zj:H4MVUuviFNZ0E1Jl2t
Score
7/10
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2932 takeown.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2192 set thread context of 3036 2192 PO0424024.exe 28 PID 3036 set thread context of 1232 3036 PO0424024.exe 21 PID 3036 set thread context of 2932 3036 PO0424024.exe 31 PID 2932 set thread context of 1232 2932 takeown.exe 21 -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 3036 PO0424024.exe 3036 PO0424024.exe 3036 PO0424024.exe 3036 PO0424024.exe 3036 PO0424024.exe 3036 PO0424024.exe 3036 PO0424024.exe 3036 PO0424024.exe 2932 takeown.exe 2932 takeown.exe 2932 takeown.exe 2932 takeown.exe 2932 takeown.exe 2932 takeown.exe 2932 takeown.exe 2932 takeown.exe 2932 takeown.exe 2932 takeown.exe 2932 takeown.exe 2932 takeown.exe 2932 takeown.exe 2932 takeown.exe 2932 takeown.exe 2932 takeown.exe 2932 takeown.exe 2932 takeown.exe 2932 takeown.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3036 PO0424024.exe 1232 Explorer.EXE 1232 Explorer.EXE 2932 takeown.exe 2932 takeown.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2192 wrote to memory of 3036 2192 PO0424024.exe 28 PID 2192 wrote to memory of 3036 2192 PO0424024.exe 28 PID 2192 wrote to memory of 3036 2192 PO0424024.exe 28 PID 2192 wrote to memory of 3036 2192 PO0424024.exe 28 PID 2192 wrote to memory of 3036 2192 PO0424024.exe 28 PID 2192 wrote to memory of 3036 2192 PO0424024.exe 28 PID 2192 wrote to memory of 3036 2192 PO0424024.exe 28 PID 1232 wrote to memory of 2932 1232 Explorer.EXE 31 PID 1232 wrote to memory of 2932 1232 Explorer.EXE 31 PID 1232 wrote to memory of 2932 1232 Explorer.EXE 31 PID 1232 wrote to memory of 2932 1232 Explorer.EXE 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\PO0424024.exe"C:\Users\Admin\AppData\Local\Temp\PO0424024.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\PO0424024.exe"C:\Users\Admin\AppData\Local\Temp\PO0424024.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3036
-
-
-
C:\Windows\SysWOW64\takeown.exe"C:\Windows\SysWOW64\takeown.exe"2⤵
- Modifies file permissions
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2932
-