Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 13:17

General

  • Target

    b855f795a9bf03ab46a373dc09066ac18994a0603101e40b3a0fa3b0959caf8a.exe

  • Size

    660KB

  • MD5

    4a06e90bd3d2deadd72a3161fd1b1d1d

  • SHA1

    8b3564120558d49090bcc08f47482bafbaf27a19

  • SHA256

    b855f795a9bf03ab46a373dc09066ac18994a0603101e40b3a0fa3b0959caf8a

  • SHA512

    27b3eec5fde0f239f12c920def54a857b2fd233b1d8dc7a5637a5d79be5e78ec5306338d3168221576475fb95b9f951138435a8f5e9d8ea47046ff3f358a30c9

  • SSDEEP

    12288:97K72wJqy2+pgRxRkmPabdQNED+YnsdFtxDkopJsw/kvZ:tq2wIy2+pwxRHaSxYnsdWopJs5R

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Program crash 1 IoCs
  • Modifies registry class 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b855f795a9bf03ab46a373dc09066ac18994a0603101e40b3a0fa3b0959caf8a.exe
    "C:\Users\Admin\AppData\Local\Temp\b855f795a9bf03ab46a373dc09066ac18994a0603101e40b3a0fa3b0959caf8a.exe"
    1⤵
    • Checks BIOS information in registry
    • Modifies registry class
    PID:1688
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1688 -s 1136
      2⤵
      • Program crash
      PID:1236
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1688 -ip 1688
    1⤵
      PID:4828

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1688-132-0x0000000000400000-0x00000000004D2000-memory.dmp

      Filesize

      840KB

    • memory/1688-134-0x0000000002090000-0x00000000020E6000-memory.dmp

      Filesize

      344KB

    • memory/1688-139-0x0000000002091000-0x00000000020C7000-memory.dmp

      Filesize

      216KB

    • memory/1688-140-0x0000000000401000-0x0000000000405000-memory.dmp

      Filesize

      16KB

    • memory/1688-141-0x0000000000400000-0x00000000004D2000-memory.dmp

      Filesize

      840KB

    • memory/1688-142-0x0000000002091000-0x00000000020C7000-memory.dmp

      Filesize

      216KB