Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 05:23
Static task
static1
Behavioral task
behavioral1
Sample
cbe8a4d9fae7f06a4a4b27e72dde6e49d59f6ce590f9aa085edd9a01b50985b4N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cbe8a4d9fae7f06a4a4b27e72dde6e49d59f6ce590f9aa085edd9a01b50985b4N.exe
Resource
win10v2004-20240802-en
General
-
Target
cbe8a4d9fae7f06a4a4b27e72dde6e49d59f6ce590f9aa085edd9a01b50985b4N.exe
-
Size
934KB
-
MD5
40798c7fb5e7f658728cc74e449029a0
-
SHA1
b07aabe0ded3f24648af5e997462a7feb31bc472
-
SHA256
cbe8a4d9fae7f06a4a4b27e72dde6e49d59f6ce590f9aa085edd9a01b50985b4
-
SHA512
8c82cb79e559c24f3dcc42b2b8e5b1a8c0abc8e7b222e6ebb2bf90e9e3f9edad44d2e0092a046fb2273119e1dd0df23c6cf1621d4e7e5f024bfc3878fc6f5b22
-
SSDEEP
24576:Qb5kSYaLTVlaVNxUTGbTmJbiBfqtE5SQQ:Qb5k2L5MNx1dBf5gQQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2800 cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2800 cmd.exe 3044 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3044 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2056 cbe8a4d9fae7f06a4a4b27e72dde6e49d59f6ce590f9aa085edd9a01b50985b4N.exe 2056 cbe8a4d9fae7f06a4a4b27e72dde6e49d59f6ce590f9aa085edd9a01b50985b4N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2056 cbe8a4d9fae7f06a4a4b27e72dde6e49d59f6ce590f9aa085edd9a01b50985b4N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2800 2056 cbe8a4d9fae7f06a4a4b27e72dde6e49d59f6ce590f9aa085edd9a01b50985b4N.exe 30 PID 2056 wrote to memory of 2800 2056 cbe8a4d9fae7f06a4a4b27e72dde6e49d59f6ce590f9aa085edd9a01b50985b4N.exe 30 PID 2056 wrote to memory of 2800 2056 cbe8a4d9fae7f06a4a4b27e72dde6e49d59f6ce590f9aa085edd9a01b50985b4N.exe 30 PID 2800 wrote to memory of 3044 2800 cmd.exe 32 PID 2800 wrote to memory of 3044 2800 cmd.exe 32 PID 2800 wrote to memory of 3044 2800 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbe8a4d9fae7f06a4a4b27e72dde6e49d59f6ce590f9aa085edd9a01b50985b4N.exe"C:\Users\Admin\AppData\Local\Temp\cbe8a4d9fae7f06a4a4b27e72dde6e49d59f6ce590f9aa085edd9a01b50985b4N.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\cbe8a4d9fae7f06a4a4b27e72dde6e49d59f6ce590f9aa085edd9a01b50985b4N.exe"2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3044
-
-