Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 12:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c36b1441efc1e106b116dfa1f428cc41.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
c36b1441efc1e106b116dfa1f428cc41.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
c36b1441efc1e106b116dfa1f428cc41.exe
-
Size
316KB
-
MD5
c36b1441efc1e106b116dfa1f428cc41
-
SHA1
2fad47d9b780f556752d4d42c80973138634176c
-
SHA256
13c0b4df7f3247aaa00a2a3525e858642feca796109f6941fc61ca21f17a3666
-
SHA512
3f31eab90ffe7b77b4de9fd3f175f6bdc89d00d040339447557c6192d1b228aa5fb33a5e4bbdcd0473848834a78a2948d9ec3a381baa8aa9b94a8fc555034bb5
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEWdLM6s:FytbV3kSoXaLnToslQ9
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2860 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2652 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2132 c36b1441efc1e106b116dfa1f428cc41.exe 2132 c36b1441efc1e106b116dfa1f428cc41.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2132 c36b1441efc1e106b116dfa1f428cc41.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2860 2132 c36b1441efc1e106b116dfa1f428cc41.exe 28 PID 2132 wrote to memory of 2860 2132 c36b1441efc1e106b116dfa1f428cc41.exe 28 PID 2132 wrote to memory of 2860 2132 c36b1441efc1e106b116dfa1f428cc41.exe 28 PID 2860 wrote to memory of 2652 2860 cmd.exe 30 PID 2860 wrote to memory of 2652 2860 cmd.exe 30 PID 2860 wrote to memory of 2652 2860 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c36b1441efc1e106b116dfa1f428cc41.exe"C:\Users\Admin\AppData\Local\Temp\c36b1441efc1e106b116dfa1f428cc41.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\c36b1441efc1e106b116dfa1f428cc41.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2652
-
-