Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 00:02
Static task
static1
Behavioral task
behavioral1
Sample
015c872d72b30780d44d29099f9ac03da54b3ff56c032e0dd93cccc8148aeb39.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
015c872d72b30780d44d29099f9ac03da54b3ff56c032e0dd93cccc8148aeb39.exe
Resource
win10v2004-20220812-en
General
-
Target
015c872d72b30780d44d29099f9ac03da54b3ff56c032e0dd93cccc8148aeb39.exe
-
Size
370KB
-
MD5
f30d1229a72ddfb272afe212d87a1bf2
-
SHA1
99cdf75dd481f69a59d6ac846513febf727c4a14
-
SHA256
015c872d72b30780d44d29099f9ac03da54b3ff56c032e0dd93cccc8148aeb39
-
SHA512
3edf780c13dbec743b73c2290755528fb942a73b990c6f4b3d0e4b3b4bd350b47437df9764d19a69336e3ea57d235ff2cb81f59a49367d0beb7d1e837355c5b7
-
SSDEEP
6144:G8WqoHN9mQRuA8eFpnMJhS6IjTp0tDPPUz05lMlsKOZSXjLS:KHjmQRXFGS68pI00DMl7TLS
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4684 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4040 wrote to memory of 4900 4040 015c872d72b30780d44d29099f9ac03da54b3ff56c032e0dd93cccc8148aeb39.exe 80 PID 4040 wrote to memory of 4900 4040 015c872d72b30780d44d29099f9ac03da54b3ff56c032e0dd93cccc8148aeb39.exe 80 PID 4040 wrote to memory of 4900 4040 015c872d72b30780d44d29099f9ac03da54b3ff56c032e0dd93cccc8148aeb39.exe 80 PID 4900 wrote to memory of 4684 4900 cmd.exe 82 PID 4900 wrote to memory of 4684 4900 cmd.exe 82 PID 4900 wrote to memory of 4684 4900 cmd.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\015c872d72b30780d44d29099f9ac03da54b3ff56c032e0dd93cccc8148aeb39.exe"C:\Users\Admin\AppData\Local\Temp\015c872d72b30780d44d29099f9ac03da54b3ff56c032e0dd93cccc8148aeb39.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\015c872d72b30780d44d29099f9ac03da54b3ff56c032e0dd93cccc8148aeb39.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:4684
-
-