Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
39s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28/11/2022, 00:02
Static task
static1
Behavioral task
behavioral1
Sample
015c872d72b30780d44d29099f9ac03da54b3ff56c032e0dd93cccc8148aeb39.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
015c872d72b30780d44d29099f9ac03da54b3ff56c032e0dd93cccc8148aeb39.exe
Resource
win10v2004-20220812-en
General
-
Target
015c872d72b30780d44d29099f9ac03da54b3ff56c032e0dd93cccc8148aeb39.exe
-
Size
370KB
-
MD5
f30d1229a72ddfb272afe212d87a1bf2
-
SHA1
99cdf75dd481f69a59d6ac846513febf727c4a14
-
SHA256
015c872d72b30780d44d29099f9ac03da54b3ff56c032e0dd93cccc8148aeb39
-
SHA512
3edf780c13dbec743b73c2290755528fb942a73b990c6f4b3d0e4b3b4bd350b47437df9764d19a69336e3ea57d235ff2cb81f59a49367d0beb7d1e837355c5b7
-
SSDEEP
6144:G8WqoHN9mQRuA8eFpnMJhS6IjTp0tDPPUz05lMlsKOZSXjLS:KHjmQRXFGS68pI00DMl7TLS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 284 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1164 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1948 wrote to memory of 284 1948 015c872d72b30780d44d29099f9ac03da54b3ff56c032e0dd93cccc8148aeb39.exe 30 PID 1948 wrote to memory of 284 1948 015c872d72b30780d44d29099f9ac03da54b3ff56c032e0dd93cccc8148aeb39.exe 30 PID 1948 wrote to memory of 284 1948 015c872d72b30780d44d29099f9ac03da54b3ff56c032e0dd93cccc8148aeb39.exe 30 PID 1948 wrote to memory of 284 1948 015c872d72b30780d44d29099f9ac03da54b3ff56c032e0dd93cccc8148aeb39.exe 30 PID 284 wrote to memory of 1164 284 cmd.exe 32 PID 284 wrote to memory of 1164 284 cmd.exe 32 PID 284 wrote to memory of 1164 284 cmd.exe 32 PID 284 wrote to memory of 1164 284 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\015c872d72b30780d44d29099f9ac03da54b3ff56c032e0dd93cccc8148aeb39.exe"C:\Users\Admin\AppData\Local\Temp\015c872d72b30780d44d29099f9ac03da54b3ff56c032e0dd93cccc8148aeb39.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\015c872d72b30780d44d29099f9ac03da54b3ff56c032e0dd93cccc8148aeb39.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:1164
-
-