Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/01/2024, 21:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3f1e4dc1fdd43f4a34ae7f585b0da85b.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
3f1e4dc1fdd43f4a34ae7f585b0da85b.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
3f1e4dc1fdd43f4a34ae7f585b0da85b.exe
-
Size
1.2MB
-
MD5
3f1e4dc1fdd43f4a34ae7f585b0da85b
-
SHA1
fab18356632e76b6ee4c7dab437624d7771ea3a2
-
SHA256
7d285f73b4645e9afa16375d6e3af7c66fa7d075bb8a86547971e26f6905d81d
-
SHA512
0f6346682dd83e0b2fe43d91a77e01ed7d19ba1fa0eee7601e060200de6c0a0b26f46922247e912a5695b07d606918a611c2cbc90323658da9896f7310be91c1
-
SSDEEP
24576:Eb5kSYaLTVlpE+EV4NUqQxI1gGrf5NcDk7EB89VwYyLKMiBjqM+iKf02jsyD:Eb5k2L5Up41QxI1gGrfLcDhBQwYyWF9S
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1700 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1976 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2500 3f1e4dc1fdd43f4a34ae7f585b0da85b.exe 2500 3f1e4dc1fdd43f4a34ae7f585b0da85b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2500 3f1e4dc1fdd43f4a34ae7f585b0da85b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2500 wrote to memory of 1700 2500 3f1e4dc1fdd43f4a34ae7f585b0da85b.exe 28 PID 2500 wrote to memory of 1700 2500 3f1e4dc1fdd43f4a34ae7f585b0da85b.exe 28 PID 2500 wrote to memory of 1700 2500 3f1e4dc1fdd43f4a34ae7f585b0da85b.exe 28 PID 1700 wrote to memory of 1976 1700 cmd.exe 30 PID 1700 wrote to memory of 1976 1700 cmd.exe 30 PID 1700 wrote to memory of 1976 1700 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f1e4dc1fdd43f4a34ae7f585b0da85b.exe"C:\Users\Admin\AppData\Local\Temp\3f1e4dc1fdd43f4a34ae7f585b0da85b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\3f1e4dc1fdd43f4a34ae7f585b0da85b.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1976
-
-