Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 07:07
Static task
static1
Behavioral task
behavioral1
Sample
8e9fc569a8d8c1535019528bf229bfb0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8e9fc569a8d8c1535019528bf229bfb0N.exe
Resource
win10v2004-20240802-en
General
-
Target
8e9fc569a8d8c1535019528bf229bfb0N.exe
-
Size
320KB
-
MD5
8e9fc569a8d8c1535019528bf229bfb0
-
SHA1
2b87c28c8da48c19d5eb2ae78e8fabb910ca6f0c
-
SHA256
0dd9c65bc7844019fabe7dc9a2bdc548d5fac1ef743fa3435b396933e52af00e
-
SHA512
743294f1cd419aef4e80f8f86dbd101af1f864868f6a4678cae4cfb2992a5c1ef1140059d308e2909e34e2cdf3b59478b327afe678a4f6ff501e6ca49ba060be
-
SSDEEP
6144:8UORK1ttbV3kSobTYZGiNdnijoh+EiIt4f/qwfg40cB/:8ytbV3kSoXaLnyosHqMCk/
Malware Config
Signatures
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2316 cmd.exe 1300 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1300 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5108 8e9fc569a8d8c1535019528bf229bfb0N.exe 5108 8e9fc569a8d8c1535019528bf229bfb0N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5108 8e9fc569a8d8c1535019528bf229bfb0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 5108 wrote to memory of 2316 5108 8e9fc569a8d8c1535019528bf229bfb0N.exe 84 PID 5108 wrote to memory of 2316 5108 8e9fc569a8d8c1535019528bf229bfb0N.exe 84 PID 2316 wrote to memory of 1300 2316 cmd.exe 86 PID 2316 wrote to memory of 1300 2316 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e9fc569a8d8c1535019528bf229bfb0N.exe"C:\Users\Admin\AppData\Local\Temp\8e9fc569a8d8c1535019528bf229bfb0N.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\8e9fc569a8d8c1535019528bf229bfb0N.exe"2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1300
-
-