Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 15:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e200001622873a251d9abf162091c69d.exe
Resource
win7-20240319-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
e200001622873a251d9abf162091c69d.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
e200001622873a251d9abf162091c69d.exe
-
Size
488KB
-
MD5
e200001622873a251d9abf162091c69d
-
SHA1
fc2ce027fe9c0874d6f84845c7797712cf5bff4a
-
SHA256
b603453f5b3533a39493d13fb222a1cf192064021b85d75dc66357df9edf8425
-
SHA512
88251c8cb924a69cf972d35fcd2798ed4f4a9824c0dcf3aa804c714f2a3a4afb0bd095be451279749d00ca500dafac240e6601854de244ae631bccf29ea5215a
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEOtG6+4PoMRxxRuyXYu5VOC5Lw:FytbV3kSoXaLnToslbgN4PoiYu5UC5Lw
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1940 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1712 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1236 e200001622873a251d9abf162091c69d.exe 1236 e200001622873a251d9abf162091c69d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1236 e200001622873a251d9abf162091c69d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1236 wrote to memory of 1940 1236 e200001622873a251d9abf162091c69d.exe 28 PID 1236 wrote to memory of 1940 1236 e200001622873a251d9abf162091c69d.exe 28 PID 1236 wrote to memory of 1940 1236 e200001622873a251d9abf162091c69d.exe 28 PID 1940 wrote to memory of 1712 1940 cmd.exe 30 PID 1940 wrote to memory of 1712 1940 cmd.exe 30 PID 1940 wrote to memory of 1712 1940 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e200001622873a251d9abf162091c69d.exe"C:\Users\Admin\AppData\Local\Temp\e200001622873a251d9abf162091c69d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\e200001622873a251d9abf162091c69d.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1712
-
-