Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    36s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 09:58

General

  • Target

    c6e74cc61a1bc45ff91d9ed7c4554da8c71da529d2d4013d5d7fbab4356ac5ac.exe

  • Size

    778KB

  • MD5

    a2e4c63213cba0718d7a983af26934e7

  • SHA1

    9a707c2e7d9848a202472e127bf439c01264d4e3

  • SHA256

    c6e74cc61a1bc45ff91d9ed7c4554da8c71da529d2d4013d5d7fbab4356ac5ac

  • SHA512

    b38cbb9ea517f5b909af10963c1a53bbcda07b28b5c265b70110312438954d5f393529c2e00b35039923953a0eca9ee47ea161c0cd77976a87b51fa0ac6f33fc

  • SSDEEP

    24576:N/RS9UUMZlJ1dDFzNTp3H79s34GNV9WTgFv:rS961NxZs3Ukv

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 3 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1376
      • C:\Users\Admin\AppData\Local\Temp\c6e74cc61a1bc45ff91d9ed7c4554da8c71da529d2d4013d5d7fbab4356ac5ac.exe
        "C:\Users\Admin\AppData\Local\Temp\c6e74cc61a1bc45ff91d9ed7c4554da8c71da529d2d4013d5d7fbab4356ac5ac.exe"
        2⤵
        • Modifies Installed Components in the registry
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Adds Run key to start application
        • Drops file in System32 directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:744
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          3⤵
            PID:2036

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/744-54-0x0000000000400000-0x00000000004C6000-memory.dmp

        Filesize

        792KB

      • memory/744-55-0x0000000000400000-0x00000000004C6000-memory.dmp

        Filesize

        792KB