Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 10:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
15cfe7e15a9de8c877fa43f7e3af92e6.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
15cfe7e15a9de8c877fa43f7e3af92e6.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
15cfe7e15a9de8c877fa43f7e3af92e6.exe
-
Size
488KB
-
MD5
15cfe7e15a9de8c877fa43f7e3af92e6
-
SHA1
9ef32a235b5bc45754700a09d13bc7d5fbd0a067
-
SHA256
5e43c249024566adc4a792e32e374bc485a984df6e9bd7cb74a94aac079b55da
-
SHA512
155c52e2cefe56bcb0356e7ea6f864597bf9a5a8cd8c502926937d4403f3102bd2a53c116101efecb1e25e561720e2fc5e8b069bd9a4eae753033005f1c92d03
-
SSDEEP
12288:FytbV3kSoXaLnToslA4h0NOBegAmM4LfkFUBo0W:Eb5kSYaLTVlh0oxK4LsiKh
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2088 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2132 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2052 15cfe7e15a9de8c877fa43f7e3af92e6.exe 2052 15cfe7e15a9de8c877fa43f7e3af92e6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2052 15cfe7e15a9de8c877fa43f7e3af92e6.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2088 2052 15cfe7e15a9de8c877fa43f7e3af92e6.exe 18 PID 2052 wrote to memory of 2088 2052 15cfe7e15a9de8c877fa43f7e3af92e6.exe 18 PID 2052 wrote to memory of 2088 2052 15cfe7e15a9de8c877fa43f7e3af92e6.exe 18 PID 2088 wrote to memory of 2132 2088 cmd.exe 16 PID 2088 wrote to memory of 2132 2088 cmd.exe 16 PID 2088 wrote to memory of 2132 2088 cmd.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\15cfe7e15a9de8c877fa43f7e3af92e6.exe"C:\Users\Admin\AppData\Local\Temp\15cfe7e15a9de8c877fa43f7e3af92e6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\15cfe7e15a9de8c877fa43f7e3af92e6.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2088
-
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60001⤵
- Runs ping.exe
PID:2132