Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 00:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4a32f620fb246325d78fc9b11c94321b.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
4a32f620fb246325d78fc9b11c94321b.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
4a32f620fb246325d78fc9b11c94321b.exe
-
Size
644KB
-
MD5
4a32f620fb246325d78fc9b11c94321b
-
SHA1
9e18ff7448ccc7cc9fe27c6cdd78aae36eddeff0
-
SHA256
98c584b248ac1a3c1bd5d0909c292ae2c9fafc4eba8ecb61200a725089a6965f
-
SHA512
465f11c03f069164e1c8447c1088d541217d8ffd6eb40e1a81e42b048873382072e7c2f5b0108f4612a4aeeb068f043a47b5b94c64ca3de4cb8f22da8dc53397
-
SSDEEP
12288:FytbV3kSoXaLnToslYS6aiZ8OjeG1l8WCbhz4a5jjjJk1:Eb5kSYaLTVlN6zZ3jeGiz4aBj9k1
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2336 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3988 4a32f620fb246325d78fc9b11c94321b.exe 3988 4a32f620fb246325d78fc9b11c94321b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3988 4a32f620fb246325d78fc9b11c94321b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3988 wrote to memory of 4600 3988 4a32f620fb246325d78fc9b11c94321b.exe 17 PID 3988 wrote to memory of 4600 3988 4a32f620fb246325d78fc9b11c94321b.exe 17 PID 4600 wrote to memory of 2336 4600 cmd.exe 16 PID 4600 wrote to memory of 2336 4600 cmd.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a32f620fb246325d78fc9b11c94321b.exe"C:\Users\Admin\AppData\Local\Temp\4a32f620fb246325d78fc9b11c94321b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\4a32f620fb246325d78fc9b11c94321b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4600
-
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60001⤵
- Runs ping.exe
PID:2336