Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 21:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1c6c345df4e349fece32231782be3dd0.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1c6c345df4e349fece32231782be3dd0.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
1c6c345df4e349fece32231782be3dd0.exe
-
Size
488KB
-
MD5
1c6c345df4e349fece32231782be3dd0
-
SHA1
78d9b447c08971ad61c7d2fd98a8821db37d7d67
-
SHA256
46f3f9b92f830f6544e08cff57ce0813c8b766c77a277a883321a4dfdbb22109
-
SHA512
74a66d4e35118eaf255177c1058029a93e8b4944675fb5e2a6767adb6797fdb94f490c732cf9d5fa7b8bc58e037fcc212df351f2587100d20a36d5c444364c1a
-
SSDEEP
12288:FytbV3kSoXaLnTosleCDy6Q6GBeCSLIxUNBLC:Eb5kSYaLTVlLy6QW/Sb
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1524 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2188 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2288 1c6c345df4e349fece32231782be3dd0.exe 2288 1c6c345df4e349fece32231782be3dd0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2288 1c6c345df4e349fece32231782be3dd0.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2288 wrote to memory of 1524 2288 1c6c345df4e349fece32231782be3dd0.exe 16 PID 2288 wrote to memory of 1524 2288 1c6c345df4e349fece32231782be3dd0.exe 16 PID 2288 wrote to memory of 1524 2288 1c6c345df4e349fece32231782be3dd0.exe 16 PID 1524 wrote to memory of 2188 1524 cmd.exe 14 PID 1524 wrote to memory of 2188 1524 cmd.exe 14 PID 1524 wrote to memory of 2188 1524 cmd.exe 14
Processes
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60001⤵
- Runs ping.exe
PID:2188
-
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\1c6c345df4e349fece32231782be3dd0.exe"1⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1524
-
C:\Users\Admin\AppData\Local\Temp\1c6c345df4e349fece32231782be3dd0.exe"C:\Users\Admin\AppData\Local\Temp\1c6c345df4e349fece32231782be3dd0.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2288