Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 05:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3ff45c6e1603dab5731d687d0f788402.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
3ff45c6e1603dab5731d687d0f788402.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
3ff45c6e1603dab5731d687d0f788402.exe
-
Size
2.2MB
-
MD5
3ff45c6e1603dab5731d687d0f788402
-
SHA1
f710fec1fc4f42d7d9eec4101266c114e6607d4c
-
SHA256
2899305d23277c9204781be538d06a7e3be896cdc4c21a6c0904e8ff8b04d122
-
SHA512
822bf6e79a52d75efeb8aebc3683cfb99a72aa8c6484c0ff818e1b36801999b58d56d8b4a8fc7b7e6b69094bb04593d3d43051394c8daf8ff223e73fe85d17fd
-
SSDEEP
49152:Eb5k2L5wR0Dj5Y8zqSZVptnxW5EaJ0QN/gSMfcWtTwneO:EGR0DtnzqCV/Y57J0Q/tMpTo
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3560 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4368 3ff45c6e1603dab5731d687d0f788402.exe 4368 3ff45c6e1603dab5731d687d0f788402.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4368 3ff45c6e1603dab5731d687d0f788402.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4368 wrote to memory of 4856 4368 3ff45c6e1603dab5731d687d0f788402.exe 88 PID 4368 wrote to memory of 4856 4368 3ff45c6e1603dab5731d687d0f788402.exe 88 PID 4856 wrote to memory of 3560 4856 cmd.exe 90 PID 4856 wrote to memory of 3560 4856 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ff45c6e1603dab5731d687d0f788402.exe"C:\Users\Admin\AppData\Local\Temp\3ff45c6e1603dab5731d687d0f788402.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\3ff45c6e1603dab5731d687d0f788402.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:3560
-
-