Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 03:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
26c462a4763f3bb58927f88c9aeacba3.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
26c462a4763f3bb58927f88c9aeacba3.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
26c462a4763f3bb58927f88c9aeacba3.exe
-
Size
528KB
-
MD5
26c462a4763f3bb58927f88c9aeacba3
-
SHA1
bbcdbb47b54b4f3d3fac95fc0a5bd19208a7d003
-
SHA256
2d31556c2e50ac79f7c7c18bc1f521f8bfd842f3c0daa98162d29dbf2d13a497
-
SHA512
86a825c53220f2c7203e1fee48da5d7c8990e890f8af5b29fef8b23b6c7c6e9f2aa9d130e26b86e6c6cab02410bae6826d3de91afa82e3b6fa6c250b5b1b39cf
-
SSDEEP
12288:FytbV3kSoXaLnTosl6BLMJjMRA9uqjAZO8:Eb5kSYaLTVl0MlEA9njAX
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3520 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4800 26c462a4763f3bb58927f88c9aeacba3.exe 4800 26c462a4763f3bb58927f88c9aeacba3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4800 26c462a4763f3bb58927f88c9aeacba3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4800 wrote to memory of 864 4800 26c462a4763f3bb58927f88c9aeacba3.exe 87 PID 4800 wrote to memory of 864 4800 26c462a4763f3bb58927f88c9aeacba3.exe 87 PID 864 wrote to memory of 3520 864 cmd.exe 90 PID 864 wrote to memory of 3520 864 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\26c462a4763f3bb58927f88c9aeacba3.exe"C:\Users\Admin\AppData\Local\Temp\26c462a4763f3bb58927f88c9aeacba3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\26c462a4763f3bb58927f88c9aeacba3.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:3520
-
-