Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
47s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 21:58
Static task
static1
Behavioral task
behavioral1
Sample
a0753ae4f28bb4b683fceaeb567b0688bc5300fc940abbd22b0102a2a8f6a699.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a0753ae4f28bb4b683fceaeb567b0688bc5300fc940abbd22b0102a2a8f6a699.exe
Resource
win10v2004-20220812-en
General
-
Target
a0753ae4f28bb4b683fceaeb567b0688bc5300fc940abbd22b0102a2a8f6a699.exe
-
Size
454KB
-
MD5
37b7968061cbbf8ed4ad0ab4c44163d1
-
SHA1
c8b73ebd916460964f929312064c191a8be7a735
-
SHA256
a0753ae4f28bb4b683fceaeb567b0688bc5300fc940abbd22b0102a2a8f6a699
-
SHA512
e6288b60e0bb532d6cfa77d43584f35aca1bc4b04e44ed256699428bcc7c84344a201381e979267b96d958fae5292dfd3fd81fbf0dc12302ca50680f19a4baf4
-
SSDEEP
6144:nHwz3GTbQCotRKUxVF+UgAfhbGcw1Entr4NsMPTLDBB1G5maR2mgrc:nQLG4CBU3FeAfCOntAVBOlgrc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1300 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1432 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1060 wrote to memory of 1300 1060 a0753ae4f28bb4b683fceaeb567b0688bc5300fc940abbd22b0102a2a8f6a699.exe 30 PID 1060 wrote to memory of 1300 1060 a0753ae4f28bb4b683fceaeb567b0688bc5300fc940abbd22b0102a2a8f6a699.exe 30 PID 1060 wrote to memory of 1300 1060 a0753ae4f28bb4b683fceaeb567b0688bc5300fc940abbd22b0102a2a8f6a699.exe 30 PID 1060 wrote to memory of 1300 1060 a0753ae4f28bb4b683fceaeb567b0688bc5300fc940abbd22b0102a2a8f6a699.exe 30 PID 1300 wrote to memory of 1432 1300 cmd.exe 32 PID 1300 wrote to memory of 1432 1300 cmd.exe 32 PID 1300 wrote to memory of 1432 1300 cmd.exe 32 PID 1300 wrote to memory of 1432 1300 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0753ae4f28bb4b683fceaeb567b0688bc5300fc940abbd22b0102a2a8f6a699.exe"C:\Users\Admin\AppData\Local\Temp\a0753ae4f28bb4b683fceaeb567b0688bc5300fc940abbd22b0102a2a8f6a699.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\a0753ae4f28bb4b683fceaeb567b0688bc5300fc940abbd22b0102a2a8f6a699.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:1432
-
-