Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
3s -
max time network
26s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2022, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
b70f8047152d23f9c5b486799926a07e4cf83dbd544b6da24747094b0e041aa9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b70f8047152d23f9c5b486799926a07e4cf83dbd544b6da24747094b0e041aa9.exe
Resource
win10v2004-20220812-en
General
-
Target
b70f8047152d23f9c5b486799926a07e4cf83dbd544b6da24747094b0e041aa9.exe
-
Size
872KB
-
MD5
03ef13ead5421ff2a1852fc3537b6410
-
SHA1
41ed5549f2462600d70bd4c20abb204fa7c7d544
-
SHA256
b70f8047152d23f9c5b486799926a07e4cf83dbd544b6da24747094b0e041aa9
-
SHA512
2271982a68a4eb1bc09e3b5b810858b42fbabf03059f638935643a207fcd6d2e74424357d1045111266340560f6f402b431905ec8571b488bbe14e8ab7ea99c6
-
SSDEEP
24576:j33f6iBcSgv6QpC6pvQcHeIFTpQuUmAHoEk:jf6YcS01vQgVdcFk
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b70f8047152d23f9c5b486799926a07e4cf83dbd544b6da24747094b0e041aa9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b70f8047152d23f9c5b486799926a07e4cf83dbd544b6da24747094b0e041aa9.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b70f8047152d23f9c5b486799926a07e4cf83dbd544b6da24747094b0e041aa9.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 b70f8047152d23f9c5b486799926a07e4cf83dbd544b6da24747094b0e041aa9.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1992 set thread context of 4976 1992 b70f8047152d23f9c5b486799926a07e4cf83dbd544b6da24747094b0e041aa9.exe 51 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1992 wrote to memory of 4976 1992 b70f8047152d23f9c5b486799926a07e4cf83dbd544b6da24747094b0e041aa9.exe 51 PID 1992 wrote to memory of 4976 1992 b70f8047152d23f9c5b486799926a07e4cf83dbd544b6da24747094b0e041aa9.exe 51 PID 1992 wrote to memory of 4976 1992 b70f8047152d23f9c5b486799926a07e4cf83dbd544b6da24747094b0e041aa9.exe 51 PID 1992 wrote to memory of 4976 1992 b70f8047152d23f9c5b486799926a07e4cf83dbd544b6da24747094b0e041aa9.exe 51 PID 1992 wrote to memory of 4976 1992 b70f8047152d23f9c5b486799926a07e4cf83dbd544b6da24747094b0e041aa9.exe 51 PID 1992 wrote to memory of 4976 1992 b70f8047152d23f9c5b486799926a07e4cf83dbd544b6da24747094b0e041aa9.exe 51 PID 1992 wrote to memory of 4976 1992 b70f8047152d23f9c5b486799926a07e4cf83dbd544b6da24747094b0e041aa9.exe 51 PID 1992 wrote to memory of 4976 1992 b70f8047152d23f9c5b486799926a07e4cf83dbd544b6da24747094b0e041aa9.exe 51 PID 1992 wrote to memory of 4976 1992 b70f8047152d23f9c5b486799926a07e4cf83dbd544b6da24747094b0e041aa9.exe 51 PID 1992 wrote to memory of 4976 1992 b70f8047152d23f9c5b486799926a07e4cf83dbd544b6da24747094b0e041aa9.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\b70f8047152d23f9c5b486799926a07e4cf83dbd544b6da24747094b0e041aa9.exe"C:\Users\Admin\AppData\Local\Temp\b70f8047152d23f9c5b486799926a07e4cf83dbd544b6da24747094b0e041aa9.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\b70f8047152d23f9c5b486799926a07e4cf83dbd544b6da24747094b0e041aa9.exe"C:\Users\Admin\AppData\Local\Temp\b70f8047152d23f9c5b486799926a07e4cf83dbd544b6da24747094b0e041aa9.exe" Track=""2⤵PID:4976
-