Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 22:06
Static task
static1
Behavioral task
behavioral1
Sample
180e247957002c4b808a723048121800N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
180e247957002c4b808a723048121800N.exe
Resource
win10v2004-20240709-en
General
-
Target
180e247957002c4b808a723048121800N.exe
-
Size
274KB
-
MD5
180e247957002c4b808a723048121800
-
SHA1
f8a93a517cebb0ed5998e8f1e7c0e1c5e8adb6bf
-
SHA256
1e4ea94a154ccb8a0b528af28b02d1de81df4aa058009b1b3d314913a4a79ecb
-
SHA512
888bdfa232d64aad43dae0af43d57f993d86a0a5fa66a5bbd8d6f67b3f798ae025d07d3af762dc8a9c0d4d4b7aaae2219f4cbe264f8085a1922061fa9aafe32c
-
SSDEEP
6144:fUORK1ttbV3kSobTYZGiNdnikoh+KiRgj:fytbV3kSoXaLnxoslyj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2400 cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2400 cmd.exe 2120 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2120 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2476 180e247957002c4b808a723048121800N.exe 2476 180e247957002c4b808a723048121800N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2476 180e247957002c4b808a723048121800N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2400 2476 180e247957002c4b808a723048121800N.exe 30 PID 2476 wrote to memory of 2400 2476 180e247957002c4b808a723048121800N.exe 30 PID 2476 wrote to memory of 2400 2476 180e247957002c4b808a723048121800N.exe 30 PID 2400 wrote to memory of 2120 2400 cmd.exe 32 PID 2400 wrote to memory of 2120 2400 cmd.exe 32 PID 2400 wrote to memory of 2120 2400 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\180e247957002c4b808a723048121800N.exe"C:\Users\Admin\AppData\Local\Temp\180e247957002c4b808a723048121800N.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\180e247957002c4b808a723048121800N.exe"2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2120
-
-