Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
03d70bdd06663b9a80e5673890db73b4.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
03d70bdd06663b9a80e5673890db73b4.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
03d70bdd06663b9a80e5673890db73b4.exe
-
Size
830KB
-
MD5
03d70bdd06663b9a80e5673890db73b4
-
SHA1
60328eef03d995b5a1ea6cbf2d0b811f7574e262
-
SHA256
20270d546b86d482ff7193cb8ddc49d6940afb48618735ffca99c9968bf3e1c4
-
SHA512
fdf81bb955e9d912f81cb8d90bd85b554f735aa6ee31dbaaaa53c17c86ca84dd5c8e2ffc6e27c97d0079e48c5e2d45b47b82467989065391ca6d39b289db3c3c
-
SSDEEP
6144:xNebEp/X1sfPnpw1Hk3iWp3dViqhfFNhGqWxI8PVKhxgaMjvxQ:3Rp/FufOY3dFNIq6ImxQ
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2620 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2860 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2620 2384 03d70bdd06663b9a80e5673890db73b4.exe 33 PID 2384 wrote to memory of 2620 2384 03d70bdd06663b9a80e5673890db73b4.exe 33 PID 2384 wrote to memory of 2620 2384 03d70bdd06663b9a80e5673890db73b4.exe 33 PID 2384 wrote to memory of 2620 2384 03d70bdd06663b9a80e5673890db73b4.exe 33 PID 2620 wrote to memory of 2860 2620 cmd.exe 32 PID 2620 wrote to memory of 2860 2620 cmd.exe 32 PID 2620 wrote to memory of 2860 2620 cmd.exe 32 PID 2620 wrote to memory of 2860 2620 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\03d70bdd06663b9a80e5673890db73b4.exe"C:\Users\Admin\AppData\Local\Temp\03d70bdd06663b9a80e5673890db73b4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\03d70bdd06663b9a80e5673890db73b4.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2620
-
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30001⤵
- Runs ping.exe
PID:2860