Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 00:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4a32f620fb246325d78fc9b11c94321b.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
4a32f620fb246325d78fc9b11c94321b.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
4a32f620fb246325d78fc9b11c94321b.exe
-
Size
644KB
-
MD5
4a32f620fb246325d78fc9b11c94321b
-
SHA1
9e18ff7448ccc7cc9fe27c6cdd78aae36eddeff0
-
SHA256
98c584b248ac1a3c1bd5d0909c292ae2c9fafc4eba8ecb61200a725089a6965f
-
SHA512
465f11c03f069164e1c8447c1088d541217d8ffd6eb40e1a81e42b048873382072e7c2f5b0108f4612a4aeeb068f043a47b5b94c64ca3de4cb8f22da8dc53397
-
SSDEEP
12288:FytbV3kSoXaLnToslYS6aiZ8OjeG1l8WCbhz4a5jjjJk1:Eb5kSYaLTVlN6zZ3jeGiz4aBj9k1
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1816 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2004 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2664 4a32f620fb246325d78fc9b11c94321b.exe 2664 4a32f620fb246325d78fc9b11c94321b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2664 4a32f620fb246325d78fc9b11c94321b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2664 wrote to memory of 1816 2664 4a32f620fb246325d78fc9b11c94321b.exe 16 PID 2664 wrote to memory of 1816 2664 4a32f620fb246325d78fc9b11c94321b.exe 16 PID 2664 wrote to memory of 1816 2664 4a32f620fb246325d78fc9b11c94321b.exe 16 PID 1816 wrote to memory of 2004 1816 cmd.exe 15 PID 1816 wrote to memory of 2004 1816 cmd.exe 15 PID 1816 wrote to memory of 2004 1816 cmd.exe 15
Processes
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60001⤵
- Runs ping.exe
PID:2004
-
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\4a32f620fb246325d78fc9b11c94321b.exe"1⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1816
-
C:\Users\Admin\AppData\Local\Temp\4a32f620fb246325d78fc9b11c94321b.exe"C:\Users\Admin\AppData\Local\Temp\4a32f620fb246325d78fc9b11c94321b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664