Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 13:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b78c2fb28357728d80b4b99417da2613.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
b78c2fb28357728d80b4b99417da2613.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
b78c2fb28357728d80b4b99417da2613.exe
-
Size
316KB
-
MD5
b78c2fb28357728d80b4b99417da2613
-
SHA1
16dbce067d176a98a4f5d035443ece59abdc9d8b
-
SHA256
40cb024f2607fc48f028183e49af8ac6cdc5628d95228c9f23c24d9df356e814
-
SHA512
c11121ee21f43ff884df37f8eb9caa82b760ba9fa6c0363e0a406f621f07e6e7c0597cd2f668a9034b3bdd06ec74674728079ed19bd72af804bce7e53c3b364a
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEQMREpDqS:FytbV3kSoXaLnToslNk4
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3620 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1696 b78c2fb28357728d80b4b99417da2613.exe 1696 b78c2fb28357728d80b4b99417da2613.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1696 b78c2fb28357728d80b4b99417da2613.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2452 1696 b78c2fb28357728d80b4b99417da2613.exe 89 PID 1696 wrote to memory of 2452 1696 b78c2fb28357728d80b4b99417da2613.exe 89 PID 2452 wrote to memory of 3620 2452 cmd.exe 91 PID 2452 wrote to memory of 3620 2452 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\b78c2fb28357728d80b4b99417da2613.exe"C:\Users\Admin\AppData\Local\Temp\b78c2fb28357728d80b4b99417da2613.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\b78c2fb28357728d80b4b99417da2613.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:3620
-
-