Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 05:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240704-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240709-en
7 signatures
150 seconds
General
-
Target
file.exe
-
Size
804KB
-
MD5
231b50057ad6ffccd5144a9b09b6c7ef
-
SHA1
c690fd7646ed42338113a58c1c373fc55d6aa5b8
-
SHA256
421b0ef1c2a88cd4748fc910f2ae7ccf92070bc8bf85884282eadb64b1ee78e2
-
SHA512
dd861316f7294ea53ce1f09c3b444e94decb840359ad98c9449d52ca077e93058c66ba0027b62cbab31b6b6102db7d24517061d85a8873e3f706aabef08388eb
-
SSDEEP
12288:3Sx14GBK5SYHdZPyhaJm0PoNDNu9H/MLZZTxKO4789RmAz7tlud:3SmSHlNaH/MLZZ9KO4PAvt
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2532 set thread context of 2872 2532 file.exe 31 PID 2872 set thread context of 1212 2872 file.exe 21 PID 2872 set thread context of 2604 2872 file.exe 32 PID 2604 set thread context of 1212 2604 convert.exe 21 -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier convert.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2532 file.exe 2532 file.exe 2872 file.exe 2872 file.exe 2872 file.exe 2872 file.exe 2872 file.exe 2872 file.exe 2872 file.exe 2872 file.exe 2604 convert.exe 2604 convert.exe 2604 convert.exe 2604 convert.exe 2604 convert.exe 2604 convert.exe 2604 convert.exe 2604 convert.exe 2604 convert.exe 2604 convert.exe 2604 convert.exe 2604 convert.exe 2604 convert.exe 2604 convert.exe 2604 convert.exe 2604 convert.exe 2604 convert.exe 2604 convert.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2872 file.exe 1212 Explorer.EXE 1212 Explorer.EXE 2604 convert.exe 2604 convert.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2532 file.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2872 2532 file.exe 31 PID 2532 wrote to memory of 2872 2532 file.exe 31 PID 2532 wrote to memory of 2872 2532 file.exe 31 PID 2532 wrote to memory of 2872 2532 file.exe 31 PID 2532 wrote to memory of 2872 2532 file.exe 31 PID 2532 wrote to memory of 2872 2532 file.exe 31 PID 2532 wrote to memory of 2872 2532 file.exe 31 PID 1212 wrote to memory of 2604 1212 Explorer.EXE 32 PID 1212 wrote to memory of 2604 1212 Explorer.EXE 32 PID 1212 wrote to memory of 2604 1212 Explorer.EXE 32 PID 1212 wrote to memory of 2604 1212 Explorer.EXE 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2872
-
-
-
C:\Windows\SysWOW64\convert.exe"C:\Windows\SysWOW64\convert.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2604
-