Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 15:48
Static task
static1
Behavioral task
behavioral1
Sample
2a93504c72b153c8deadb1a9c734ed68.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2a93504c72b153c8deadb1a9c734ed68.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2a93504c72b153c8deadb1a9c734ed68.exe
-
Size
386KB
-
MD5
2a93504c72b153c8deadb1a9c734ed68
-
SHA1
614ce24a84f9527cee41f4954527e6d8ac77a0e2
-
SHA256
168f883564691d83ca0aceb3a27fe1828af28699de2901740179c4dd695e8686
-
SHA512
5887d5bdf86344f2b53f5f20a85f1ed3783c7cf92e381fa0ff0758fae9686a976de70b1c2d4def14632ae77191caf3e39c233d7e2f7d375c10d4d03a4ce5edcc
-
SSDEEP
6144:OVoeBd+OFLo8OLYXC1DLZE8TLrzL0z206tk7GFJVI6gE1uw9UR8fsqP7h/h1L66E:OVoeBZKYXC1DLZEoLb0wk2YM1xsWFpzE
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2584 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2644 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2584 2088 2a93504c72b153c8deadb1a9c734ed68.exe 33 PID 2088 wrote to memory of 2584 2088 2a93504c72b153c8deadb1a9c734ed68.exe 33 PID 2088 wrote to memory of 2584 2088 2a93504c72b153c8deadb1a9c734ed68.exe 33 PID 2088 wrote to memory of 2584 2088 2a93504c72b153c8deadb1a9c734ed68.exe 33 PID 2584 wrote to memory of 2644 2584 cmd.exe 35 PID 2584 wrote to memory of 2644 2584 cmd.exe 35 PID 2584 wrote to memory of 2644 2584 cmd.exe 35 PID 2584 wrote to memory of 2644 2584 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a93504c72b153c8deadb1a9c734ed68.exe"C:\Users\Admin\AppData\Local\Temp\2a93504c72b153c8deadb1a9c734ed68.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\2a93504c72b153c8deadb1a9c734ed68.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2644
-
-