Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
29s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
b283181a93730882ebd53c4bb747113b9c1bd70a97251d816205becf4b001f67.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b283181a93730882ebd53c4bb747113b9c1bd70a97251d816205becf4b001f67.exe
Resource
win10v2004-20220812-en
General
-
Target
b283181a93730882ebd53c4bb747113b9c1bd70a97251d816205becf4b001f67.exe
-
Size
1.0MB
-
MD5
501c162e8283ef94ed68511838f7ae4b
-
SHA1
9e0c453bac5cee7f444da3c30d121830e960aa5e
-
SHA256
b283181a93730882ebd53c4bb747113b9c1bd70a97251d816205becf4b001f67
-
SHA512
5642c3ab496476e1b4d3d22387ee65baccfe7095fa0162f109d925792707bbc9bf246be99400a5593bc75aa4e2783365f4985d16d24592a028660ef049b211a3
-
SSDEEP
24576:FIH2tDv0iOX8V2fIlzikiEv9ywoL77h6VFWwmb1/Ahx5jD:MiOgEkiqO77h6VFXckzf
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b283181a93730882ebd53c4bb747113b9c1bd70a97251d816205becf4b001f67.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate b283181a93730882ebd53c4bb747113b9c1bd70a97251d816205becf4b001f67.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{12BE6E64-6F91-D31D-44F3-7C99EDEED405} b283181a93730882ebd53c4bb747113b9c1bd70a97251d816205becf4b001f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{12BE6E64-6F91-D31D-44F3-7C99EDEED405}\ = "PSFactoryBuffer" b283181a93730882ebd53c4bb747113b9c1bd70a97251d816205becf4b001f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{12BE6E64-6F91-D31D-44F3-7C99EDEED405}\InProcServer32 b283181a93730882ebd53c4bb747113b9c1bd70a97251d816205becf4b001f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{12BE6E64-6F91-D31D-44F3-7C99EDEED405}\InProcServer32\ = "%SystemRoot%\\SysWow64\\windowscodecs.dll" b283181a93730882ebd53c4bb747113b9c1bd70a97251d816205becf4b001f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{12BE6E64-6F91-D31D-44F3-7C99EDEED405}\InProcServer32\ThreadingModel = "Both" b283181a93730882ebd53c4bb747113b9c1bd70a97251d816205becf4b001f67.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1160 b283181a93730882ebd53c4bb747113b9c1bd70a97251d816205becf4b001f67.exe Token: SeIncBasePriorityPrivilege 1160 b283181a93730882ebd53c4bb747113b9c1bd70a97251d816205becf4b001f67.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1160 b283181a93730882ebd53c4bb747113b9c1bd70a97251d816205becf4b001f67.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b283181a93730882ebd53c4bb747113b9c1bd70a97251d816205becf4b001f67.exe"C:\Users\Admin\AppData\Local\Temp\b283181a93730882ebd53c4bb747113b9c1bd70a97251d816205becf4b001f67.exe"1⤵
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1160