Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
173s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2022, 14:57
Static task
static1
Behavioral task
behavioral1
Sample
30eb4726c40980d837ffd32e710b61e49135235a12ad2afda33b6ebf60325ee9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
30eb4726c40980d837ffd32e710b61e49135235a12ad2afda33b6ebf60325ee9.exe
Resource
win10v2004-20220812-en
General
-
Target
30eb4726c40980d837ffd32e710b61e49135235a12ad2afda33b6ebf60325ee9.exe
-
Size
503KB
-
MD5
bd50bee02d682a7db641de433a9240ac
-
SHA1
ba20a924207904590c14e4b4dfdceca2c8fab5a5
-
SHA256
30eb4726c40980d837ffd32e710b61e49135235a12ad2afda33b6ebf60325ee9
-
SHA512
5d7efee9ead8cff6e016e684f0bf65ec2fc9dbc3d9058e9827ac7dcf66f7fc8deea7eeeb8e39b2f4710579fe029f3d50d733b50e5be9c847752f4f91888645e8
-
SSDEEP
12288:lFbMAxatT0AkpESBKewcNsw4sN14CJnX+Y88oRkWn7iYH2/m9A4s7i:Jt9XXYuYWrdi
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 29 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4804 set thread context of 1544 4804 30eb4726c40980d837ffd32e710b61e49135235a12ad2afda33b6ebf60325ee9.exe 82 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 filehistory.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier filehistory.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1544 filehistory.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1544 filehistory.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1544 filehistory.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4804 wrote to memory of 1544 4804 30eb4726c40980d837ffd32e710b61e49135235a12ad2afda33b6ebf60325ee9.exe 82 PID 4804 wrote to memory of 1544 4804 30eb4726c40980d837ffd32e710b61e49135235a12ad2afda33b6ebf60325ee9.exe 82 PID 4804 wrote to memory of 1544 4804 30eb4726c40980d837ffd32e710b61e49135235a12ad2afda33b6ebf60325ee9.exe 82 PID 4804 wrote to memory of 1544 4804 30eb4726c40980d837ffd32e710b61e49135235a12ad2afda33b6ebf60325ee9.exe 82 PID 4804 wrote to memory of 1544 4804 30eb4726c40980d837ffd32e710b61e49135235a12ad2afda33b6ebf60325ee9.exe 82 PID 4804 wrote to memory of 1544 4804 30eb4726c40980d837ffd32e710b61e49135235a12ad2afda33b6ebf60325ee9.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\30eb4726c40980d837ffd32e710b61e49135235a12ad2afda33b6ebf60325ee9.exe"C:\Users\Admin\AppData\Local\Temp\30eb4726c40980d837ffd32e710b61e49135235a12ad2afda33b6ebf60325ee9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4804 -
\??\c:\windows\system32\filehistory.exec:\windows\system32\filehistory.exe2⤵
- Checks processor information in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1544
-