Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 20:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1bb55c197eb6d82e0fb5bfa2eb75d6a5.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1bb55c197eb6d82e0fb5bfa2eb75d6a5.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
1bb55c197eb6d82e0fb5bfa2eb75d6a5.exe
-
Size
316KB
-
MD5
1bb55c197eb6d82e0fb5bfa2eb75d6a5
-
SHA1
f4ed963d86584cd44e990b77e965c555e2126d0e
-
SHA256
21a6fa33e51bb3cc7a247553a06c26b8ac4d952d149ab6047d94229aa12065b4
-
SHA512
01d0e28c882b833f08e07c6eaca64aaf2809fec422ce64e9380dedc4a26c8ba3fa0429408c20984e570f2ffb26d05480d1a442aeb783b80a7d5170f0847b2bd1
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEshwElKaw:FytbV3kSoXaLnToslq6w
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1548 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4936 1bb55c197eb6d82e0fb5bfa2eb75d6a5.exe 4936 1bb55c197eb6d82e0fb5bfa2eb75d6a5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4936 1bb55c197eb6d82e0fb5bfa2eb75d6a5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4936 wrote to memory of 1332 4936 1bb55c197eb6d82e0fb5bfa2eb75d6a5.exe 87 PID 4936 wrote to memory of 1332 4936 1bb55c197eb6d82e0fb5bfa2eb75d6a5.exe 87 PID 1332 wrote to memory of 1548 1332 cmd.exe 89 PID 1332 wrote to memory of 1548 1332 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bb55c197eb6d82e0fb5bfa2eb75d6a5.exe"C:\Users\Admin\AppData\Local\Temp\1bb55c197eb6d82e0fb5bfa2eb75d6a5.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\1bb55c197eb6d82e0fb5bfa2eb75d6a5.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1548
-
-