Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 07:08
Static task
static1
Behavioral task
behavioral1
Sample
E-2023-06-41-041-00843.scr.exe
Resource
win7-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
E-2023-06-41-041-00843.scr.exe
Resource
win10v2004-20240426-en
5 signatures
150 seconds
General
-
Target
E-2023-06-41-041-00843.scr.exe
-
Size
796KB
-
MD5
92ec67b7638c45ee9d630f040afa1a05
-
SHA1
71ba6474dfc1076790acac25273a27ec2b40855c
-
SHA256
9ad9044ccdce7cc6c110fd6f5fab5204c76f38a2e6107627a0b1478d004a7e5c
-
SHA512
f0dd2ccc5379bced925557830d95f1988ad5c397889aae3ca8a0dcfad655fd2579f0459b780c0044d3ebc98f65d8967b5768b312d21c31d402ed398d7f5e52f5
-
SSDEEP
12288:KP1U4Alx9gU2nghU/2Az/VOOxb4PpGzmSg83XlwEqBACR5leZlNGEwkR:KPVfNFTVdxb4PpGySgG1VsA+ersE3
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 532 set thread context of 968 532 E-2023-06-41-041-00843.scr.exe 88 PID 968 set thread context of 3452 968 E-2023-06-41-041-00843.scr.exe 55 PID 968 set thread context of 4200 968 E-2023-06-41-041-00843.scr.exe 90 PID 4200 set thread context of 3452 4200 w32tm.exe 55 PID 4200 set thread context of 2540 4200 w32tm.exe 91 -
description ioc Process Key created \Registry\User\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 w32tm.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 968 E-2023-06-41-041-00843.scr.exe 968 E-2023-06-41-041-00843.scr.exe 968 E-2023-06-41-041-00843.scr.exe 968 E-2023-06-41-041-00843.scr.exe 968 E-2023-06-41-041-00843.scr.exe 968 E-2023-06-41-041-00843.scr.exe 968 E-2023-06-41-041-00843.scr.exe 968 E-2023-06-41-041-00843.scr.exe 968 E-2023-06-41-041-00843.scr.exe 968 E-2023-06-41-041-00843.scr.exe 968 E-2023-06-41-041-00843.scr.exe 968 E-2023-06-41-041-00843.scr.exe 968 E-2023-06-41-041-00843.scr.exe 968 E-2023-06-41-041-00843.scr.exe 968 E-2023-06-41-041-00843.scr.exe 968 E-2023-06-41-041-00843.scr.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 968 E-2023-06-41-041-00843.scr.exe 3452 Explorer.EXE 3452 Explorer.EXE 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe 4200 w32tm.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 532 wrote to memory of 968 532 E-2023-06-41-041-00843.scr.exe 88 PID 532 wrote to memory of 968 532 E-2023-06-41-041-00843.scr.exe 88 PID 532 wrote to memory of 968 532 E-2023-06-41-041-00843.scr.exe 88 PID 532 wrote to memory of 968 532 E-2023-06-41-041-00843.scr.exe 88 PID 532 wrote to memory of 968 532 E-2023-06-41-041-00843.scr.exe 88 PID 532 wrote to memory of 968 532 E-2023-06-41-041-00843.scr.exe 88 PID 3452 wrote to memory of 4200 3452 Explorer.EXE 90 PID 3452 wrote to memory of 4200 3452 Explorer.EXE 90 PID 3452 wrote to memory of 4200 3452 Explorer.EXE 90 PID 4200 wrote to memory of 2540 4200 w32tm.exe 91 PID 4200 wrote to memory of 2540 4200 w32tm.exe 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\E-2023-06-41-041-00843.scr.exe"C:\Users\Admin\AppData\Local\Temp\E-2023-06-41-041-00843.scr.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\E-2023-06-41-041-00843.scr.exe"C:\Users\Admin\AppData\Local\Temp\E-2023-06-41-041-00843.scr.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:968
-
-
-
C:\Windows\SysWOW64\w32tm.exe"C:\Windows\SysWOW64\w32tm.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2540
-
-