Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
57s -
max time network
75s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 02:46
Static task
static1
Behavioral task
behavioral1
Sample
ac92b45f123c639840ad6f360c6ea6a53ceed85e9b0297db28d095383077eadf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ac92b45f123c639840ad6f360c6ea6a53ceed85e9b0297db28d095383077eadf.exe
Resource
win10v2004-20221111-en
General
-
Target
ac92b45f123c639840ad6f360c6ea6a53ceed85e9b0297db28d095383077eadf.exe
-
Size
370KB
-
MD5
40e1062d32d4fb56a70b2428e8775d34
-
SHA1
2bae2a6fef06d828628b0d2bccfd6e41bbec1064
-
SHA256
ac92b45f123c639840ad6f360c6ea6a53ceed85e9b0297db28d095383077eadf
-
SHA512
53006596edc0a72ca9d9029a6530a9263915ef4eb617e9290ecb34830da20116f4164c482d56ba59884865f1d71bdbbf40838dd8dff80162174092a183b2ca3b
-
SSDEEP
6144:r8WqoHN9mQRuA8eFpnMJhS6IjTp0tDPPUz05lMlsKOCSBj9F:tHjmQRXFGS68pI00DMlQV9F
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1468 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1544 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1452 wrote to memory of 1468 1452 ac92b45f123c639840ad6f360c6ea6a53ceed85e9b0297db28d095383077eadf.exe 29 PID 1452 wrote to memory of 1468 1452 ac92b45f123c639840ad6f360c6ea6a53ceed85e9b0297db28d095383077eadf.exe 29 PID 1452 wrote to memory of 1468 1452 ac92b45f123c639840ad6f360c6ea6a53ceed85e9b0297db28d095383077eadf.exe 29 PID 1452 wrote to memory of 1468 1452 ac92b45f123c639840ad6f360c6ea6a53ceed85e9b0297db28d095383077eadf.exe 29 PID 1468 wrote to memory of 1544 1468 cmd.exe 31 PID 1468 wrote to memory of 1544 1468 cmd.exe 31 PID 1468 wrote to memory of 1544 1468 cmd.exe 31 PID 1468 wrote to memory of 1544 1468 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac92b45f123c639840ad6f360c6ea6a53ceed85e9b0297db28d095383077eadf.exe"C:\Users\Admin\AppData\Local\Temp\ac92b45f123c639840ad6f360c6ea6a53ceed85e9b0297db28d095383077eadf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\ac92b45f123c639840ad6f360c6ea6a53ceed85e9b0297db28d095383077eadf.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:1544
-
-