Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 00:18
Static task
static1
Behavioral task
behavioral1
Sample
fd358f5a3946ab5d6e78d269e16b0b6d426dcfd3b6dc7ba6b42f2dd9ea44d1f9.exe
Resource
win7-20220812-en
General
-
Target
fd358f5a3946ab5d6e78d269e16b0b6d426dcfd3b6dc7ba6b42f2dd9ea44d1f9.exe
-
Size
902KB
-
MD5
9868d086489a9265592193ddbe6f3fa0
-
SHA1
22f820d459cab4830894232ff09d7a484bbaa544
-
SHA256
fd358f5a3946ab5d6e78d269e16b0b6d426dcfd3b6dc7ba6b42f2dd9ea44d1f9
-
SHA512
6cc93112657ed25d4c28f0ad968548d5f287511c022aae0d380d8fce7da03a98884a2cf3303be6d592187e97dd235b03ed9dddd3ef68023b46ffddb62b49a6d7
-
SSDEEP
12288:GaaaaaaaaaXrvjcQPc6iUOl1FnCvdTCRYKuiWNYmOU+:vrJPc/FDYimO
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest fd358f5a3946ab5d6e78d269e16b0b6d426dcfd3b6dc7ba6b42f2dd9ea44d1f9.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2000 fd358f5a3946ab5d6e78d269e16b0b6d426dcfd3b6dc7ba6b42f2dd9ea44d1f9.exe 2000 fd358f5a3946ab5d6e78d269e16b0b6d426dcfd3b6dc7ba6b42f2dd9ea44d1f9.exe 2000 fd358f5a3946ab5d6e78d269e16b0b6d426dcfd3b6dc7ba6b42f2dd9ea44d1f9.exe 2000 fd358f5a3946ab5d6e78d269e16b0b6d426dcfd3b6dc7ba6b42f2dd9ea44d1f9.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2000 fd358f5a3946ab5d6e78d269e16b0b6d426dcfd3b6dc7ba6b42f2dd9ea44d1f9.exe Token: SeCreateGlobalPrivilege 2000 fd358f5a3946ab5d6e78d269e16b0b6d426dcfd3b6dc7ba6b42f2dd9ea44d1f9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd358f5a3946ab5d6e78d269e16b0b6d426dcfd3b6dc7ba6b42f2dd9ea44d1f9.exe"C:\Users\Admin\AppData\Local\Temp\fd358f5a3946ab5d6e78d269e16b0b6d426dcfd3b6dc7ba6b42f2dd9ea44d1f9.exe"1⤵
- Enumerates VirtualBox registry keys
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000