Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 12:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
TestFKRT.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
TestFKRT.exe
Resource
win10v2004-20240508-en
13 signatures
150 seconds
General
-
Target
TestFKRT.exe
-
Size
375KB
-
MD5
7167b97b30f2650bc2fe30ea6aea8c60
-
SHA1
1df3d35a76b75545a092db90ad74a5732a52be00
-
SHA256
c38f9d7b02cb20690aae34a7b85ca91c95be43813ca609694d79a13111357bf4
-
SHA512
183fbe184aae509f5e7728316dc6e31e1505476dce42c17e433d0c3b1c6865bef55ff806ad359bd0dfb0e7d945d4ba11a7565067b88fec3f514ee3e3d4128b0c
-
SSDEEP
6144:MOGkB/vhyOc10KgGwHqwOOELha+sm2D2+UhngNQK4t6DqeLUEEiRgc5uJV/qb:vhzc10KgGXFhazmdVg+K4t6DqbEBuJV
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2580 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 bitbucket.org 4 bitbucket.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2680 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2220 TestFKRT.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2220 TestFKRT.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2580 2220 TestFKRT.exe 28 PID 2220 wrote to memory of 2580 2220 TestFKRT.exe 28 PID 2220 wrote to memory of 2580 2220 TestFKRT.exe 28 PID 2580 wrote to memory of 2680 2580 cmd.exe 30 PID 2580 wrote to memory of 2680 2580 cmd.exe 30 PID 2580 wrote to memory of 2680 2580 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\TestFKRT.exe"C:\Users\Admin\AppData\Local\Temp\TestFKRT.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3001 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\TestFKRT.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 30013⤵
- Runs ping.exe
PID:2680
-
-