Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 04:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
545495a267721d7fa6c53913fcdd4943.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
545495a267721d7fa6c53913fcdd4943.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
545495a267721d7fa6c53913fcdd4943.exe
-
Size
644KB
-
MD5
545495a267721d7fa6c53913fcdd4943
-
SHA1
e12f3db56b2e270b9ffc900e9c552ccfe1c79edc
-
SHA256
0400139d2b4eacfe432809fb5bcb725737713fb6be98da7f80691f27f1e0249a
-
SHA512
52d42c6fe36e66c24a9c5367d9532609b18e2c76fc7b87dafe453e97c4d08c78381fbd17c1a88d78a795a44f49cec388b32cba1a33318a142f951a0957944ce4
-
SSDEEP
12288:FytbV3kSoXaLnToslsuiGQEeMQhNB4Z3w3keEM0RxwiTSLUs:Eb5kSYaLTVls+QEMB463kG0RmsSYs
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2380 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2472 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1252 545495a267721d7fa6c53913fcdd4943.exe 1252 545495a267721d7fa6c53913fcdd4943.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1252 545495a267721d7fa6c53913fcdd4943.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1252 wrote to memory of 2380 1252 545495a267721d7fa6c53913fcdd4943.exe 18 PID 1252 wrote to memory of 2380 1252 545495a267721d7fa6c53913fcdd4943.exe 18 PID 1252 wrote to memory of 2380 1252 545495a267721d7fa6c53913fcdd4943.exe 18 PID 2380 wrote to memory of 2472 2380 cmd.exe 16 PID 2380 wrote to memory of 2472 2380 cmd.exe 16 PID 2380 wrote to memory of 2472 2380 cmd.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\545495a267721d7fa6c53913fcdd4943.exe"C:\Users\Admin\AppData\Local\Temp\545495a267721d7fa6c53913fcdd4943.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\545495a267721d7fa6c53913fcdd4943.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2380
-
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60001⤵
- Runs ping.exe
PID:2472