Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 19:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
65d45deb7d910b91ea88cc97d18fb119.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
65d45deb7d910b91ea88cc97d18fb119.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
65d45deb7d910b91ea88cc97d18fb119.exe
-
Size
488KB
-
MD5
65d45deb7d910b91ea88cc97d18fb119
-
SHA1
6f33cf1c987ac10c3b1e684faf4c690070c7f003
-
SHA256
c5ed0aeae0e248ede8c5b181e7bd8f46cb778be87771029bf75f599ca7e6bd99
-
SHA512
94acc2bf2598fd04abb2673ccb6d925c1cafea554fbb425c4eb125ca40d402279a3d7de7b901fc26d16c1c1d3d21d8639c3584f30511ea9e76e784fc814b76fa
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEDPzTFfloKTKiUBAnBBg4hNW+fymf:FytbV3kSoXaLnTosl6f72664H
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1324 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3316 65d45deb7d910b91ea88cc97d18fb119.exe 3316 65d45deb7d910b91ea88cc97d18fb119.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3316 65d45deb7d910b91ea88cc97d18fb119.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3316 wrote to memory of 3756 3316 65d45deb7d910b91ea88cc97d18fb119.exe 88 PID 3316 wrote to memory of 3756 3316 65d45deb7d910b91ea88cc97d18fb119.exe 88 PID 3756 wrote to memory of 1324 3756 cmd.exe 91 PID 3756 wrote to memory of 1324 3756 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\65d45deb7d910b91ea88cc97d18fb119.exe"C:\Users\Admin\AppData\Local\Temp\65d45deb7d910b91ea88cc97d18fb119.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\65d45deb7d910b91ea88cc97d18fb119.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1324
-
-