Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 13:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b78c2fb28357728d80b4b99417da2613.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
b78c2fb28357728d80b4b99417da2613.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
b78c2fb28357728d80b4b99417da2613.exe
-
Size
316KB
-
MD5
b78c2fb28357728d80b4b99417da2613
-
SHA1
16dbce067d176a98a4f5d035443ece59abdc9d8b
-
SHA256
40cb024f2607fc48f028183e49af8ac6cdc5628d95228c9f23c24d9df356e814
-
SHA512
c11121ee21f43ff884df37f8eb9caa82b760ba9fa6c0363e0a406f621f07e6e7c0597cd2f668a9034b3bdd06ec74674728079ed19bd72af804bce7e53c3b364a
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEQMREpDqS:FytbV3kSoXaLnToslNk4
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2832 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2916 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1668 b78c2fb28357728d80b4b99417da2613.exe 1668 b78c2fb28357728d80b4b99417da2613.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1668 b78c2fb28357728d80b4b99417da2613.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2832 1668 b78c2fb28357728d80b4b99417da2613.exe 28 PID 1668 wrote to memory of 2832 1668 b78c2fb28357728d80b4b99417da2613.exe 28 PID 1668 wrote to memory of 2832 1668 b78c2fb28357728d80b4b99417da2613.exe 28 PID 2832 wrote to memory of 2916 2832 cmd.exe 30 PID 2832 wrote to memory of 2916 2832 cmd.exe 30 PID 2832 wrote to memory of 2916 2832 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b78c2fb28357728d80b4b99417da2613.exe"C:\Users\Admin\AppData\Local\Temp\b78c2fb28357728d80b4b99417da2613.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\b78c2fb28357728d80b4b99417da2613.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2916
-
-