Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 04:48
Behavioral task
behavioral1
Sample
5a44ae7920dc593135b805bf5353f822011271e9e722e30d9bb3b2f685d94f43.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5a44ae7920dc593135b805bf5353f822011271e9e722e30d9bb3b2f685d94f43.exe
Resource
win10v2004-20240508-en
General
-
Target
5a44ae7920dc593135b805bf5353f822011271e9e722e30d9bb3b2f685d94f43.exe
-
Size
8.3MB
-
MD5
e32cb5ba8656c60a5574d5f000517d8e
-
SHA1
5a54a9e5237d9d7e992aea9ac6ed72c1c8d9221e
-
SHA256
5a44ae7920dc593135b805bf5353f822011271e9e722e30d9bb3b2f685d94f43
-
SHA512
2e936501e35558c614ea536a3a0788c54adb77572bd8d1143ca68fde83dd4668f65538d89f3ab0200b986c6310f0abe3347c189c86254ed4e41adb8b17dba7a7
-
SSDEEP
196608:/MFsG1QWBTJpXnl5NQPoro0S3WBcTqz0ty:0FsGKC9FlrQaS3r4b
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4416-11-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-12-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-13-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-14-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-15-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-16-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-17-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-18-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-19-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-20-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-21-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-22-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-23-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-24-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-25-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-26-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-27-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-28-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-29-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-30-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-31-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-32-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-33-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-34-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-35-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-36-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-37-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-40-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-49-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-50-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-51-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-52-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-53-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-54-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-55-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-56-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-57-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-58-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-59-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-60-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-61-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-62-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-63-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-64-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-65-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-66-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-67-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-68-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect behavioral2/memory/4416-69-0x0000000000400000-0x000000000188C000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4416 5a44ae7920dc593135b805bf5353f822011271e9e722e30d9bb3b2f685d94f43.exe 4416 5a44ae7920dc593135b805bf5353f822011271e9e722e30d9bb3b2f685d94f43.exe 4416 5a44ae7920dc593135b805bf5353f822011271e9e722e30d9bb3b2f685d94f43.exe 4416 5a44ae7920dc593135b805bf5353f822011271e9e722e30d9bb3b2f685d94f43.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4416 5a44ae7920dc593135b805bf5353f822011271e9e722e30d9bb3b2f685d94f43.exe 4416 5a44ae7920dc593135b805bf5353f822011271e9e722e30d9bb3b2f685d94f43.exe 4416 5a44ae7920dc593135b805bf5353f822011271e9e722e30d9bb3b2f685d94f43.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a44ae7920dc593135b805bf5353f822011271e9e722e30d9bb3b2f685d94f43.exe"C:\Users\Admin\AppData\Local\Temp\5a44ae7920dc593135b805bf5353f822011271e9e722e30d9bb3b2f685d94f43.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4416
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4068,i,7012731823941922179,12386606396608877869,262144 --variations-seed-version --mojo-platform-channel-handle=4020 /prefetch:81⤵PID:3572