Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 14:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
50d627eea9de0f94771995b7dda763a7.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
50d627eea9de0f94771995b7dda763a7.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
50d627eea9de0f94771995b7dda763a7.exe
-
Size
544KB
-
MD5
50d627eea9de0f94771995b7dda763a7
-
SHA1
c069ce1147768b6299cfb08fc6d8ba58fd060922
-
SHA256
79f3ef59c972be90e84cf08f9b79b0eb24e24725d43bc777b4801c929a84fe1d
-
SHA512
ab16b48541c23a79a0cca097e03fb566086d441621b27b640b9356289ce5db69de5baeaf4eb7713efcb0e011f10244460fa85f4749d298b5698abbbd4f59d99c
-
SSDEEP
12288:FytbV3kSoXaLnToslUFbuBtXqiif/B74wm7JxpVH2/Zt/8Z:Eb5kSYaLTVlUYXDQZ74xHpQ/Ztu
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4904 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2064 50d627eea9de0f94771995b7dda763a7.exe 2064 50d627eea9de0f94771995b7dda763a7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2064 50d627eea9de0f94771995b7dda763a7.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 1188 2064 50d627eea9de0f94771995b7dda763a7.exe 20 PID 2064 wrote to memory of 1188 2064 50d627eea9de0f94771995b7dda763a7.exe 20 PID 1188 wrote to memory of 4904 1188 cmd.exe 18 PID 1188 wrote to memory of 4904 1188 cmd.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\50d627eea9de0f94771995b7dda763a7.exe"C:\Users\Admin\AppData\Local\Temp\50d627eea9de0f94771995b7dda763a7.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\50d627eea9de0f94771995b7dda763a7.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1188
-
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60001⤵
- Runs ping.exe
PID:4904