Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
22/06/2024, 17:36
240622-v6w45swhkc 1016/11/2023, 07:55
231116-jr41nahf9v 315/11/2023, 14:30
231115-rvbghsbd22 3Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
16/11/2023, 07:55
Static task
static1
Behavioral task
behavioral1
Sample
pikabot.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
pikabot.exe
Resource
win10v2004-20231020-en
General
-
Target
pikabot.exe
-
Size
306KB
-
MD5
a12001230dd6f5ca67f7935bcfdcd650
-
SHA1
fd39ca7366ca63f15a6e61e2cbda9195077a83b6
-
SHA256
39d6f7865949ae7bb846f56bff4f62a96d7277d2872fec68c09e1227e6db9206
-
SHA512
224d6c55953440d894d84787a88f6230964a9ec44f323dcdc49ebd9722cc5426719f36d202b586f408d0bd8d4e1502ba7edbb9037c500b1cab31242ada6bce91
-
SSDEEP
3072:engX9CnOMcKVtnEcoVzr4j0NnRT+JwMU3AWoeFE1YerPvbyg1ihk6kvtfGq0ev37:EZ7ZGVzr4jq5kJRwFE77arkR10efUKh
Malware Config
Signatures
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2908 netstat.exe 2700 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1856 pikabot.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2696 whoami.exe Token: SeDebugPrivilege 2696 whoami.exe Token: SeDebugPrivilege 2696 whoami.exe Token: SeDebugPrivilege 2696 whoami.exe Token: SeDebugPrivilege 2696 whoami.exe Token: SeDebugPrivilege 2696 whoami.exe Token: SeDebugPrivilege 2696 whoami.exe Token: SeDebugPrivilege 2696 whoami.exe Token: SeDebugPrivilege 2696 whoami.exe Token: SeDebugPrivilege 2696 whoami.exe Token: SeDebugPrivilege 2696 whoami.exe Token: SeDebugPrivilege 2696 whoami.exe Token: SeDebugPrivilege 2696 whoami.exe Token: SeDebugPrivilege 2696 whoami.exe Token: SeDebugPrivilege 2696 whoami.exe Token: SeDebugPrivilege 2696 whoami.exe Token: SeDebugPrivilege 2696 whoami.exe Token: SeDebugPrivilege 2696 whoami.exe Token: SeDebugPrivilege 2696 whoami.exe Token: SeDebugPrivilege 2696 whoami.exe Token: SeDebugPrivilege 2696 whoami.exe Token: SeDebugPrivilege 2696 whoami.exe Token: SeDebugPrivilege 2696 whoami.exe Token: SeDebugPrivilege 2908 netstat.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1856 wrote to memory of 2696 1856 pikabot.exe 28 PID 1856 wrote to memory of 2696 1856 pikabot.exe 28 PID 1856 wrote to memory of 2696 1856 pikabot.exe 28 PID 1856 wrote to memory of 2696 1856 pikabot.exe 28 PID 1856 wrote to memory of 2700 1856 pikabot.exe 30 PID 1856 wrote to memory of 2700 1856 pikabot.exe 30 PID 1856 wrote to memory of 2700 1856 pikabot.exe 30 PID 1856 wrote to memory of 2700 1856 pikabot.exe 30 PID 1856 wrote to memory of 2908 1856 pikabot.exe 32 PID 1856 wrote to memory of 2908 1856 pikabot.exe 32 PID 1856 wrote to memory of 2908 1856 pikabot.exe 32 PID 1856 wrote to memory of 2908 1856 pikabot.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\pikabot.exe"C:\Users\Admin\AppData\Local\Temp\pikabot.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\whoami.exewhoami.exe /all2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig.exe /all2⤵
- Gathers network information
PID:2700
-
-
C:\Windows\SysWOW64\netstat.exenetstat.exe -aon2⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2908
-