Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 07:50
Static task
static1
Behavioral task
behavioral1
Sample
101a6be989d316f11685f21b7681dd2e.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
101a6be989d316f11685f21b7681dd2e.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
101a6be989d316f11685f21b7681dd2e.exe
-
Size
385KB
-
MD5
101a6be989d316f11685f21b7681dd2e
-
SHA1
ce5077853495aabf615a011af3ab9f57af4bd709
-
SHA256
2267d4cbfd735dd13a69b44831a29e0261783c57ef24c541d774587617ab392b
-
SHA512
9e99b270281abc4c5b90e2b3e9d43d64d14ac5baf341df05ec5c4cd330a961f58bf0c49f335be5fd50e2d5a3091b5a5a15f16fccc42a6ca06fc3b07111349d88
-
SSDEEP
6144:6EbqBnScjHOtvt9d3o+SyTuzSMUqmbZe2N1lpu3RCl5kN:RkSgIV9d4+ASMUH971ZuN
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2084 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1940 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2084 2088 101a6be989d316f11685f21b7681dd2e.exe 33 PID 2088 wrote to memory of 2084 2088 101a6be989d316f11685f21b7681dd2e.exe 33 PID 2088 wrote to memory of 2084 2088 101a6be989d316f11685f21b7681dd2e.exe 33 PID 2088 wrote to memory of 2084 2088 101a6be989d316f11685f21b7681dd2e.exe 33 PID 2084 wrote to memory of 1940 2084 cmd.exe 34 PID 2084 wrote to memory of 1940 2084 cmd.exe 34 PID 2084 wrote to memory of 1940 2084 cmd.exe 34 PID 2084 wrote to memory of 1940 2084 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\101a6be989d316f11685f21b7681dd2e.exe"C:\Users\Admin\AppData\Local\Temp\101a6be989d316f11685f21b7681dd2e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\101a6be989d316f11685f21b7681dd2e.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:1940
-
-