Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 03:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4f7fda157bb27a575fb8296855c6c1fe.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
4f7fda157bb27a575fb8296855c6c1fe.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
4f7fda157bb27a575fb8296855c6c1fe.exe
-
Size
316KB
-
MD5
4f7fda157bb27a575fb8296855c6c1fe
-
SHA1
e5d7dccacdfa1e1516bd98c3f030f4b803f2a7c6
-
SHA256
a2ef5ce94362471c761e0f08ec4bb1710d665267106ef1767e74f5e172357955
-
SHA512
a5e376a5a2d43f473609441806c0593bba0e7bc8726dc1f4776d3d9990626f931f98488a353ec5dd0cf7c16846392ee661a7307cfe23aae1e477acda3f48333c
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEVjbzMF+i:FytbV3kSoXaLnToslojboF+i
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1336 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1428 4f7fda157bb27a575fb8296855c6c1fe.exe 1428 4f7fda157bb27a575fb8296855c6c1fe.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1428 4f7fda157bb27a575fb8296855c6c1fe.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1428 wrote to memory of 3716 1428 4f7fda157bb27a575fb8296855c6c1fe.exe 90 PID 1428 wrote to memory of 3716 1428 4f7fda157bb27a575fb8296855c6c1fe.exe 90 PID 3716 wrote to memory of 1336 3716 cmd.exe 91 PID 3716 wrote to memory of 1336 3716 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f7fda157bb27a575fb8296855c6c1fe.exe"C:\Users\Admin\AppData\Local\Temp\4f7fda157bb27a575fb8296855c6c1fe.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\4f7fda157bb27a575fb8296855c6c1fe.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1336
-
-