Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 23:15
Static task
static1
Behavioral task
behavioral1
Sample
42912da99864c4de4088b82fb0dd095f.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
42912da99864c4de4088b82fb0dd095f.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
42912da99864c4de4088b82fb0dd095f.exe
-
Size
830KB
-
MD5
42912da99864c4de4088b82fb0dd095f
-
SHA1
68f4da77a6e259438f5397c3133580c3b19a9869
-
SHA256
244b3d9e7e8e85b29aa1e529e34993a7ad2dcc56a419fd35aff240feedccc000
-
SHA512
09253aa2fcb0f59a67f602faacb1f242c4f22703c1f23a233c034fe61054b55e37b6d36f012a8a5cac6e176d7a484d8c046e3169129197b46e749f0e13a6d9bf
-
SSDEEP
6144:502F1rpX61l35GGeRntljEHWzxO+ytRdXR11C+hTaDkCIQsO6SghLvk:5vrB6D35GGeRntljBzM+eTxaDTIQw3rk
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2748 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2580 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2748 2856 42912da99864c4de4088b82fb0dd095f.exe 30 PID 2856 wrote to memory of 2748 2856 42912da99864c4de4088b82fb0dd095f.exe 30 PID 2856 wrote to memory of 2748 2856 42912da99864c4de4088b82fb0dd095f.exe 30 PID 2856 wrote to memory of 2748 2856 42912da99864c4de4088b82fb0dd095f.exe 30 PID 2748 wrote to memory of 2580 2748 cmd.exe 32 PID 2748 wrote to memory of 2580 2748 cmd.exe 32 PID 2748 wrote to memory of 2580 2748 cmd.exe 32 PID 2748 wrote to memory of 2580 2748 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\42912da99864c4de4088b82fb0dd095f.exe"C:\Users\Admin\AppData\Local\Temp\42912da99864c4de4088b82fb0dd095f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\42912da99864c4de4088b82fb0dd095f.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2580
-
-