Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 21:58
Static task
static1
Behavioral task
behavioral1
Sample
a0753ae4f28bb4b683fceaeb567b0688bc5300fc940abbd22b0102a2a8f6a699.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a0753ae4f28bb4b683fceaeb567b0688bc5300fc940abbd22b0102a2a8f6a699.exe
Resource
win10v2004-20220812-en
General
-
Target
a0753ae4f28bb4b683fceaeb567b0688bc5300fc940abbd22b0102a2a8f6a699.exe
-
Size
454KB
-
MD5
37b7968061cbbf8ed4ad0ab4c44163d1
-
SHA1
c8b73ebd916460964f929312064c191a8be7a735
-
SHA256
a0753ae4f28bb4b683fceaeb567b0688bc5300fc940abbd22b0102a2a8f6a699
-
SHA512
e6288b60e0bb532d6cfa77d43584f35aca1bc4b04e44ed256699428bcc7c84344a201381e979267b96d958fae5292dfd3fd81fbf0dc12302ca50680f19a4baf4
-
SSDEEP
6144:nHwz3GTbQCotRKUxVF+UgAfhbGcw1Entr4NsMPTLDBB1G5maR2mgrc:nQLG4CBU3FeAfCOntAVBOlgrc
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4348 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2500 2276 a0753ae4f28bb4b683fceaeb567b0688bc5300fc940abbd22b0102a2a8f6a699.exe 85 PID 2276 wrote to memory of 2500 2276 a0753ae4f28bb4b683fceaeb567b0688bc5300fc940abbd22b0102a2a8f6a699.exe 85 PID 2276 wrote to memory of 2500 2276 a0753ae4f28bb4b683fceaeb567b0688bc5300fc940abbd22b0102a2a8f6a699.exe 85 PID 2500 wrote to memory of 4348 2500 cmd.exe 87 PID 2500 wrote to memory of 4348 2500 cmd.exe 87 PID 2500 wrote to memory of 4348 2500 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0753ae4f28bb4b683fceaeb567b0688bc5300fc940abbd22b0102a2a8f6a699.exe"C:\Users\Admin\AppData\Local\Temp\a0753ae4f28bb4b683fceaeb567b0688bc5300fc940abbd22b0102a2a8f6a699.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\a0753ae4f28bb4b683fceaeb567b0688bc5300fc940abbd22b0102a2a8f6a699.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:4348
-
-