Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
113s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 05:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
648cdc85043356525f08aaecc47a80df.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
648cdc85043356525f08aaecc47a80df.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
648cdc85043356525f08aaecc47a80df.exe
-
Size
2.2MB
-
MD5
648cdc85043356525f08aaecc47a80df
-
SHA1
20f7445130deed36a232ed4d2d6dab3aa7ec2d9f
-
SHA256
d617064c7d9dfa0b1a2eaaee60235258b6c23c1e94c48222c17cb63f5ac4d912
-
SHA512
1b88eb4cbbee7564f4b0e49cc14859b443e003838ef697e24a75b94480625cd5c39fcd442bea7af9253b12483b41140baecc238c2d57275a7e3bb94016e273f2
-
SSDEEP
49152:Eb5k2L5+qKf9/OrJ/IayrRORJvCcCuK5BhBYFb++djdd/+PIEI:Ekqy9GrJ/lyrb+c+pdd/iIEI
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1296 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2404 648cdc85043356525f08aaecc47a80df.exe 2404 648cdc85043356525f08aaecc47a80df.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2404 648cdc85043356525f08aaecc47a80df.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2864 2404 648cdc85043356525f08aaecc47a80df.exe 87 PID 2404 wrote to memory of 2864 2404 648cdc85043356525f08aaecc47a80df.exe 87 PID 2864 wrote to memory of 1296 2864 cmd.exe 89 PID 2864 wrote to memory of 1296 2864 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\648cdc85043356525f08aaecc47a80df.exe"C:\Users\Admin\AppData\Local\Temp\648cdc85043356525f08aaecc47a80df.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\648cdc85043356525f08aaecc47a80df.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1296
-
-