Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/01/2024, 20:36
Static task
static1
Behavioral task
behavioral1
Sample
3f04e53413fb97bb48f256deab5876a3.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
3f04e53413fb97bb48f256deab5876a3.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
3f04e53413fb97bb48f256deab5876a3.exe
-
Size
457KB
-
MD5
3f04e53413fb97bb48f256deab5876a3
-
SHA1
66198113365215c5cb52bd9f559aad75404a7991
-
SHA256
20a3b3307c0c9dff1cbb1b632e625423aac6264d51bc760bd61b9cb2395ae8e4
-
SHA512
4000ae1f8a185a100cb7897d1240f94ff74f6aa76f554b4b3fab04ea9b05d69acba1c7281da58bc8d84f9885051549244f24f929a6eb2995d9f8a32c1867d972
-
SSDEEP
12288:tfKId1PIEBU5+HVwPmC1N70y/wetaZY8Zl1gr7:tf3d1AEO5WSBdPaZZj1gr7
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2804 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2384 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1564 wrote to memory of 2804 1564 3f04e53413fb97bb48f256deab5876a3.exe 32 PID 1564 wrote to memory of 2804 1564 3f04e53413fb97bb48f256deab5876a3.exe 32 PID 1564 wrote to memory of 2804 1564 3f04e53413fb97bb48f256deab5876a3.exe 32 PID 1564 wrote to memory of 2804 1564 3f04e53413fb97bb48f256deab5876a3.exe 32 PID 2804 wrote to memory of 2384 2804 cmd.exe 30 PID 2804 wrote to memory of 2384 2804 cmd.exe 30 PID 2804 wrote to memory of 2384 2804 cmd.exe 30 PID 2804 wrote to memory of 2384 2804 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f04e53413fb97bb48f256deab5876a3.exe"C:\Users\Admin\AppData\Local\Temp\3f04e53413fb97bb48f256deab5876a3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\3f04e53413fb97bb48f256deab5876a3.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2804
-
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30001⤵
- Runs ping.exe
PID:2384