Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2024, 21:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3f1e4dc1fdd43f4a34ae7f585b0da85b.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
3f1e4dc1fdd43f4a34ae7f585b0da85b.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
3f1e4dc1fdd43f4a34ae7f585b0da85b.exe
-
Size
1.2MB
-
MD5
3f1e4dc1fdd43f4a34ae7f585b0da85b
-
SHA1
fab18356632e76b6ee4c7dab437624d7771ea3a2
-
SHA256
7d285f73b4645e9afa16375d6e3af7c66fa7d075bb8a86547971e26f6905d81d
-
SHA512
0f6346682dd83e0b2fe43d91a77e01ed7d19ba1fa0eee7601e060200de6c0a0b26f46922247e912a5695b07d606918a611c2cbc90323658da9896f7310be91c1
-
SSDEEP
24576:Eb5kSYaLTVlpE+EV4NUqQxI1gGrf5NcDk7EB89VwYyLKMiBjqM+iKf02jsyD:Eb5k2L5Up41QxI1gGrfLcDhBQwYyWF9S
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5096 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3264 3f1e4dc1fdd43f4a34ae7f585b0da85b.exe 3264 3f1e4dc1fdd43f4a34ae7f585b0da85b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3264 3f1e4dc1fdd43f4a34ae7f585b0da85b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3264 wrote to memory of 2300 3264 3f1e4dc1fdd43f4a34ae7f585b0da85b.exe 88 PID 3264 wrote to memory of 2300 3264 3f1e4dc1fdd43f4a34ae7f585b0da85b.exe 88 PID 2300 wrote to memory of 5096 2300 cmd.exe 91 PID 2300 wrote to memory of 5096 2300 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f1e4dc1fdd43f4a34ae7f585b0da85b.exe"C:\Users\Admin\AppData\Local\Temp\3f1e4dc1fdd43f4a34ae7f585b0da85b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\3f1e4dc1fdd43f4a34ae7f585b0da85b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:5096
-
-