Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
c6cf9ca5fae2bbe791770df9289b9cd0b65ad3b2b2deda477fc3f28f45ad0d4a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6cf9ca5fae2bbe791770df9289b9cd0b65ad3b2b2deda477fc3f28f45ad0d4a.exe
Resource
win10v2004-20220812-en
General
-
Target
c6cf9ca5fae2bbe791770df9289b9cd0b65ad3b2b2deda477fc3f28f45ad0d4a.exe
-
Size
11KB
-
MD5
cc6cbcca9e1a1f480abc57c8ad6e2097
-
SHA1
1822223c2de44d991ddb5750c59f0cb5f2004610
-
SHA256
c6cf9ca5fae2bbe791770df9289b9cd0b65ad3b2b2deda477fc3f28f45ad0d4a
-
SHA512
01cdf20be22b5f87734062dc07a185c4a6babd6c566dda649013494f777b60ed5c3302e760acd5538bc4e56c737e44089bec8581d8c75725d928fc5a247a189c
-
SSDEEP
192:nPt+gYZUji8WZ2FWIGG3Lkdp+NVwtc2RfHF7ch67NLsmYgEpT:PEgYZXZlLCeCutc2tHFgh6hcD5
Malware Config
Signatures
-
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C3C4FB00-E38C-D4A0-39AB-AC41004E0AF2}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c6cf9ca5fae2bbe791770df9289b9cd0b65ad3b2b2deda477fc3f28f45ad0d4a.exe" c6cf9ca5fae2bbe791770df9289b9cd0b65ad3b2b2deda477fc3f28f45ad0d4a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C3C4FB00-E38C-D4A0-39AB-AC41004E0AF2}\Data c6cf9ca5fae2bbe791770df9289b9cd0b65ad3b2b2deda477fc3f28f45ad0d4a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C3C4FB00-E38C-D4A0-39AB-AC41004E0AF2}\Data\ = 00000000041d790500000000000000000000000000000000 c6cf9ca5fae2bbe791770df9289b9cd0b65ad3b2b2deda477fc3f28f45ad0d4a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C3C4FB00-E38C-D4A0-39AB-AC41004E0AF2}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c6cf9ca5fae2bbe791770df9289b9cd0b65ad3b2b2deda477fc3f28f45ad0d4a.exe" c6cf9ca5fae2bbe791770df9289b9cd0b65ad3b2b2deda477fc3f28f45ad0d4a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C3C4FB00-E38C-D4A0-39AB-AC41004E0AF2}\Data c6cf9ca5fae2bbe791770df9289b9cd0b65ad3b2b2deda477fc3f28f45ad0d4a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C3C4FB00-E38C-D4A0-39AB-AC41004E0AF2}\Data\ = 00000000041d790500000000000000000000000000000000 c6cf9ca5fae2bbe791770df9289b9cd0b65ad3b2b2deda477fc3f28f45ad0d4a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C3C4FB00-E38C-D4A0-39AB-AC41004E0AF2} c6cf9ca5fae2bbe791770df9289b9cd0b65ad3b2b2deda477fc3f28f45ad0d4a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C3C4FB00-E38C-D4A0-39AB-AC41004E0AF2}\LocalServer32 c6cf9ca5fae2bbe791770df9289b9cd0b65ad3b2b2deda477fc3f28f45ad0d4a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C3C4FB00-E38C-D4A0-39AB-AC41004E0AF2} c6cf9ca5fae2bbe791770df9289b9cd0b65ad3b2b2deda477fc3f28f45ad0d4a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C3C4FB00-E38C-D4A0-39AB-AC41004E0AF2}\LocalServer32 c6cf9ca5fae2bbe791770df9289b9cd0b65ad3b2b2deda477fc3f28f45ad0d4a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6cf9ca5fae2bbe791770df9289b9cd0b65ad3b2b2deda477fc3f28f45ad0d4a.exe"C:\Users\Admin\AppData\Local\Temp\c6cf9ca5fae2bbe791770df9289b9cd0b65ad3b2b2deda477fc3f28f45ad0d4a.exe"1⤵
- Modifies registry class
PID:336
-
C:\Users\Admin\AppData\Local\Temp\c6cf9ca5fae2bbe791770df9289b9cd0b65ad3b2b2deda477fc3f28f45ad0d4a.exe"C:\Users\Admin\AppData\Local\Temp\c6cf9ca5fae2bbe791770df9289b9cd0b65ad3b2b2deda477fc3f28f45ad0d4a.exe" /s1⤵
- Modifies registry class
PID:4844