Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 22:16
Static task
static1
Behavioral task
behavioral1
Sample
150f234feca1e923d94c81c254585578.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
150f234feca1e923d94c81c254585578.exe
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
150f234feca1e923d94c81c254585578.exe
-
Size
354KB
-
MD5
150f234feca1e923d94c81c254585578
-
SHA1
4b962d70bf8c6af57a13c15c15cc6005d7612fd0
-
SHA256
146ecb9be4e6870f0ba8acaadcb9b8e3e0fd196877fa4aece3c846349fba290b
-
SHA512
d51a4dec75b93314f26b39553da2af420cd0b3a77d11609b6416aac5cad64e93a4d819461ee8c61b24b06a83bbb700f7638b9ec5fb6591765d3315617feb1e06
-
SSDEEP
6144:ObE/qy2ztV1uS/8SlEHkY12urAyX/f1kMG5vKBqOMWYr:O+sVgg8oEHbs+T+KB5Yr
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2468 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1552 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1664 wrote to memory of 2468 1664 150f234feca1e923d94c81c254585578.exe 30 PID 1664 wrote to memory of 2468 1664 150f234feca1e923d94c81c254585578.exe 30 PID 1664 wrote to memory of 2468 1664 150f234feca1e923d94c81c254585578.exe 30 PID 1664 wrote to memory of 2468 1664 150f234feca1e923d94c81c254585578.exe 30 PID 2468 wrote to memory of 1552 2468 cmd.exe 32 PID 2468 wrote to memory of 1552 2468 cmd.exe 32 PID 2468 wrote to memory of 1552 2468 cmd.exe 32 PID 2468 wrote to memory of 1552 2468 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\150f234feca1e923d94c81c254585578.exe"C:\Users\Admin\AppData\Local\Temp\150f234feca1e923d94c81c254585578.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\150f234feca1e923d94c81c254585578.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:1552
-
-