Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
81s -
max time network
27s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 20:18 UTC
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1bb55c197eb6d82e0fb5bfa2eb75d6a5.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1bb55c197eb6d82e0fb5bfa2eb75d6a5.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
1bb55c197eb6d82e0fb5bfa2eb75d6a5.exe
-
Size
316KB
-
MD5
1bb55c197eb6d82e0fb5bfa2eb75d6a5
-
SHA1
f4ed963d86584cd44e990b77e965c555e2126d0e
-
SHA256
21a6fa33e51bb3cc7a247553a06c26b8ac4d952d149ab6047d94229aa12065b4
-
SHA512
01d0e28c882b833f08e07c6eaca64aaf2809fec422ce64e9380dedc4a26c8ba3fa0429408c20984e570f2ffb26d05480d1a442aeb783b80a7d5170f0847b2bd1
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEshwElKaw:FytbV3kSoXaLnToslq6w
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2736 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2932 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2520 1bb55c197eb6d82e0fb5bfa2eb75d6a5.exe 2520 1bb55c197eb6d82e0fb5bfa2eb75d6a5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2520 1bb55c197eb6d82e0fb5bfa2eb75d6a5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2736 2520 1bb55c197eb6d82e0fb5bfa2eb75d6a5.exe 29 PID 2520 wrote to memory of 2736 2520 1bb55c197eb6d82e0fb5bfa2eb75d6a5.exe 29 PID 2520 wrote to memory of 2736 2520 1bb55c197eb6d82e0fb5bfa2eb75d6a5.exe 29 PID 2736 wrote to memory of 2932 2736 cmd.exe 31 PID 2736 wrote to memory of 2932 2736 cmd.exe 31 PID 2736 wrote to memory of 2932 2736 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bb55c197eb6d82e0fb5bfa2eb75d6a5.exe"C:\Users\Admin\AppData\Local\Temp\1bb55c197eb6d82e0fb5bfa2eb75d6a5.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\1bb55c197eb6d82e0fb5bfa2eb75d6a5.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2932
-
-