Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2022, 09:02
Static task
static1
Behavioral task
behavioral1
Sample
0878ed523d5184a7ef0831213b1b1dca1a8ad3b7b998b46706e2bb94c8f782be.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0878ed523d5184a7ef0831213b1b1dca1a8ad3b7b998b46706e2bb94c8f782be.exe
Resource
win10v2004-20220901-en
General
-
Target
0878ed523d5184a7ef0831213b1b1dca1a8ad3b7b998b46706e2bb94c8f782be.exe
-
Size
615KB
-
MD5
4c49b0871f9b83d03cf067599b122e90
-
SHA1
4aa84436c760ba1d257f5965a95c3a5c7f294c74
-
SHA256
0878ed523d5184a7ef0831213b1b1dca1a8ad3b7b998b46706e2bb94c8f782be
-
SHA512
96836159d0cd982a6fc1257c4412f7a464d45299bc37126d7f702d4a470b9c140a2f9f3568675f8908efb53bff924a5fdf0a2f1ac5cfedc1829b6fae966d4070
-
SSDEEP
12288:1/XG9/i9kLEoJrAjZZliZGd/Ph6pu24S0RXIopWLqpaQ:5WgWEKAjRQGd/Pcpu9v13
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest 0878ed523d5184a7ef0831213b1b1dca1a8ad3b7b998b46706e2bb94c8f782be.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 0878ed523d5184a7ef0831213b1b1dca1a8ad3b7b998b46706e2bb94c8f782be.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\C79uO = "\"C:\\Users\\Admin\\AppData\\Roaming\\C79uO.exe\" opt" 0878ed523d5184a7ef0831213b1b1dca1a8ad3b7b998b46706e2bb94c8f782be.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3536 0878ed523d5184a7ef0831213b1b1dca1a8ad3b7b998b46706e2bb94c8f782be.exe 3536 0878ed523d5184a7ef0831213b1b1dca1a8ad3b7b998b46706e2bb94c8f782be.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3536 0878ed523d5184a7ef0831213b1b1dca1a8ad3b7b998b46706e2bb94c8f782be.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0878ed523d5184a7ef0831213b1b1dca1a8ad3b7b998b46706e2bb94c8f782be.exe"C:\Users\Admin\AppData\Local\Temp\0878ed523d5184a7ef0831213b1b1dca1a8ad3b7b998b46706e2bb94c8f782be.exe"1⤵
- Enumerates VirtualBox registry keys
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:3536
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:3780