Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 21:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4488e726cbd5a44c393dca5cac3fb18a.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
4488e726cbd5a44c393dca5cac3fb18a.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
4488e726cbd5a44c393dca5cac3fb18a.exe
-
Size
1.6MB
-
MD5
4488e726cbd5a44c393dca5cac3fb18a
-
SHA1
7294f58aa3c2510508a5f83e86e6d79308084c80
-
SHA256
943c8ceb2acb602a4ec3be97170e7ce8eb13e0660df01e3e220e5b5e4832f432
-
SHA512
8f302c7c44d1d46321d5f65e6ba77d4f2ecb6ce02fb449e31f078c7fe5f9727af560288067786f1cefbf32d2ed99e4405c184887d2966ff043e582ec55cf820d
-
SSDEEP
49152:Eb5k2L5SxoZL1Sql5koNwDfRsmp4SywQp1R5esLbE2jXZiHu:EcqZL1bl5BSbRFrepI8bXpAu
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3976 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4968 4488e726cbd5a44c393dca5cac3fb18a.exe 4968 4488e726cbd5a44c393dca5cac3fb18a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4968 4488e726cbd5a44c393dca5cac3fb18a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4968 wrote to memory of 2136 4968 4488e726cbd5a44c393dca5cac3fb18a.exe 19 PID 4968 wrote to memory of 2136 4968 4488e726cbd5a44c393dca5cac3fb18a.exe 19 PID 2136 wrote to memory of 3976 2136 cmd.exe 18 PID 2136 wrote to memory of 3976 2136 cmd.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\4488e726cbd5a44c393dca5cac3fb18a.exe"C:\Users\Admin\AppData\Local\Temp\4488e726cbd5a44c393dca5cac3fb18a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\4488e726cbd5a44c393dca5cac3fb18a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2136
-
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60001⤵
- Runs ping.exe
PID:3976