Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 12:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
36faafec433a126ac3656c332827eb6d.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
36faafec433a126ac3656c332827eb6d.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
36faafec433a126ac3656c332827eb6d.exe
-
Size
488KB
-
MD5
36faafec433a126ac3656c332827eb6d
-
SHA1
d9f90791d2adef92b59c6984f0ddeaa3fd34e0b9
-
SHA256
967673dbdb08f69fd957b96d97e9f4544886af9afa70e653faf724116be83b75
-
SHA512
629d1d3b61f2a439f0d43b531833622dedb78e00f947610083c0f9de8cfa0eb8ebebd5602ea28a81c1cfbe4bd223f0c721a1f2de89a53cc08040b017fe43c852
-
SSDEEP
12288:FytbV3kSoXaLnTosldPVQO7poPa2kCvoNd/N43AfngBYcA:Eb5kSYaLTVlpyGP8gd143AfngycA
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2660 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2236 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2284 36faafec433a126ac3656c332827eb6d.exe 2284 36faafec433a126ac3656c332827eb6d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2284 36faafec433a126ac3656c332827eb6d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2660 2284 36faafec433a126ac3656c332827eb6d.exe 27 PID 2284 wrote to memory of 2660 2284 36faafec433a126ac3656c332827eb6d.exe 27 PID 2284 wrote to memory of 2660 2284 36faafec433a126ac3656c332827eb6d.exe 27 PID 2660 wrote to memory of 2236 2660 cmd.exe 29 PID 2660 wrote to memory of 2236 2660 cmd.exe 29 PID 2660 wrote to memory of 2236 2660 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\36faafec433a126ac3656c332827eb6d.exe"C:\Users\Admin\AppData\Local\Temp\36faafec433a126ac3656c332827eb6d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\36faafec433a126ac3656c332827eb6d.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2236
-
-