Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 12:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
36faafec433a126ac3656c332827eb6d.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
36faafec433a126ac3656c332827eb6d.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
36faafec433a126ac3656c332827eb6d.exe
-
Size
488KB
-
MD5
36faafec433a126ac3656c332827eb6d
-
SHA1
d9f90791d2adef92b59c6984f0ddeaa3fd34e0b9
-
SHA256
967673dbdb08f69fd957b96d97e9f4544886af9afa70e653faf724116be83b75
-
SHA512
629d1d3b61f2a439f0d43b531833622dedb78e00f947610083c0f9de8cfa0eb8ebebd5602ea28a81c1cfbe4bd223f0c721a1f2de89a53cc08040b017fe43c852
-
SSDEEP
12288:FytbV3kSoXaLnTosldPVQO7poPa2kCvoNd/N43AfngBYcA:Eb5kSYaLTVlpyGP8gd143AfngycA
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2752 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1436 36faafec433a126ac3656c332827eb6d.exe 1436 36faafec433a126ac3656c332827eb6d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1436 36faafec433a126ac3656c332827eb6d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1436 wrote to memory of 4076 1436 36faafec433a126ac3656c332827eb6d.exe 88 PID 1436 wrote to memory of 4076 1436 36faafec433a126ac3656c332827eb6d.exe 88 PID 4076 wrote to memory of 2752 4076 cmd.exe 90 PID 4076 wrote to memory of 2752 4076 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\36faafec433a126ac3656c332827eb6d.exe"C:\Users\Admin\AppData\Local\Temp\36faafec433a126ac3656c332827eb6d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\36faafec433a126ac3656c332827eb6d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2752
-
-