Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2842af7327d2f21416d040253f3879fb.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
2842af7327d2f21416d040253f3879fb.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
2842af7327d2f21416d040253f3879fb.exe
-
Size
1.6MB
-
MD5
2842af7327d2f21416d040253f3879fb
-
SHA1
d979fa80e2ef0d32e626d67cc838270c0c54003c
-
SHA256
6e8ac492172f7262eb24c97d73da0c0e02b0fc32ebeb36fe1742745cef26981f
-
SHA512
3fb0b4bca1ff1576271be170fe4a7638272bc2d3014b0312084e696bfc03bf1a85b0b1e5bb316d4e932f2be724b825ecad2f41640fc051563a0a2c59cc368bc8
-
SSDEEP
49152:Eb5k2L5r005AZx51ElYGFsxpadwlvnpyp:EJ5aHDAjFsxpplM
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2616 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 476 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2696 2842af7327d2f21416d040253f3879fb.exe 2696 2842af7327d2f21416d040253f3879fb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2696 2842af7327d2f21416d040253f3879fb.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2616 2696 2842af7327d2f21416d040253f3879fb.exe 22 PID 2696 wrote to memory of 2616 2696 2842af7327d2f21416d040253f3879fb.exe 22 PID 2696 wrote to memory of 2616 2696 2842af7327d2f21416d040253f3879fb.exe 22 PID 2616 wrote to memory of 476 2616 cmd.exe 31 PID 2616 wrote to memory of 476 2616 cmd.exe 31 PID 2616 wrote to memory of 476 2616 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2842af7327d2f21416d040253f3879fb.exe"C:\Users\Admin\AppData\Local\Temp\2842af7327d2f21416d040253f3879fb.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\2842af7327d2f21416d040253f3879fb.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:476
-
-