Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 15:26
Static task
static1
Behavioral task
behavioral1
Sample
2d0ad2c0a6a4024938c6151af1c8818251641e53644aca7234e6c673cfa32bf2.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2d0ad2c0a6a4024938c6151af1c8818251641e53644aca7234e6c673cfa32bf2.exe
Resource
win10v2004-20240508-en
General
-
Target
2d0ad2c0a6a4024938c6151af1c8818251641e53644aca7234e6c673cfa32bf2.exe
-
Size
2.1MB
-
MD5
dee466af8361831aa636a87f41209b8f
-
SHA1
dd819646eadeddd27e3858133c0c17b0966585d5
-
SHA256
2d0ad2c0a6a4024938c6151af1c8818251641e53644aca7234e6c673cfa32bf2
-
SHA512
58a9044299e79fc2e68117b69670d3a18a2811c98e3551ac817aff04597d9587907c60726e946cf8963f0728b4dffdb24b54022d3183fb33500a1c3d8b4fabed
-
SSDEEP
49152:YwK7UQ+AMBAIbg2/qRx3eIdyhOlyd/HAg7cN4VGMccdwNc:YlIl7bfix3bwhvPx4NyGM/dwNc
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3332-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3332-33-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3332 2d0ad2c0a6a4024938c6151af1c8818251641e53644aca7234e6c673cfa32bf2.exe 3332 2d0ad2c0a6a4024938c6151af1c8818251641e53644aca7234e6c673cfa32bf2.exe 3332 2d0ad2c0a6a4024938c6151af1c8818251641e53644aca7234e6c673cfa32bf2.exe