Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 13:17
Static task
static1
Behavioral task
behavioral1
Sample
b855f795a9bf03ab46a373dc09066ac18994a0603101e40b3a0fa3b0959caf8a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b855f795a9bf03ab46a373dc09066ac18994a0603101e40b3a0fa3b0959caf8a.exe
Resource
win10v2004-20220812-en
General
-
Target
b855f795a9bf03ab46a373dc09066ac18994a0603101e40b3a0fa3b0959caf8a.exe
-
Size
660KB
-
MD5
4a06e90bd3d2deadd72a3161fd1b1d1d
-
SHA1
8b3564120558d49090bcc08f47482bafbaf27a19
-
SHA256
b855f795a9bf03ab46a373dc09066ac18994a0603101e40b3a0fa3b0959caf8a
-
SHA512
27b3eec5fde0f239f12c920def54a857b2fd233b1d8dc7a5637a5d79be5e78ec5306338d3168221576475fb95b9f951138435a8f5e9d8ea47046ff3f358a30c9
-
SSDEEP
12288:97K72wJqy2+pgRxRkmPabdQNED+YnsdFtxDkopJsw/kvZ:tq2wIy2+pwxRHaSxYnsdWopJs5R
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b855f795a9bf03ab46a373dc09066ac18994a0603101e40b3a0fa3b0959caf8a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate b855f795a9bf03ab46a373dc09066ac18994a0603101e40b3a0fa3b0959caf8a.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1236 1688 WerFault.exe 77 -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{54DA2A44-59EC-DDCC-ED6E-E5F67963B71C}\ = "PSFactoryBuffer" b855f795a9bf03ab46a373dc09066ac18994a0603101e40b3a0fa3b0959caf8a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{54DA2A44-59EC-DDCC-ED6E-E5F67963B71C}\InProcServer32 b855f795a9bf03ab46a373dc09066ac18994a0603101e40b3a0fa3b0959caf8a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{54DA2A44-59EC-DDCC-ED6E-E5F67963B71C}\InProcServer32\ = "%systemroot%\\SysWow64\\wininet.dll" b855f795a9bf03ab46a373dc09066ac18994a0603101e40b3a0fa3b0959caf8a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{54DA2A44-59EC-DDCC-ED6E-E5F67963B71C}\InProcServer32\ThreadingModel = "Both" b855f795a9bf03ab46a373dc09066ac18994a0603101e40b3a0fa3b0959caf8a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{54DA2A44-59EC-DDCC-ED6E-E5F67963B71C} b855f795a9bf03ab46a373dc09066ac18994a0603101e40b3a0fa3b0959caf8a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b855f795a9bf03ab46a373dc09066ac18994a0603101e40b3a0fa3b0959caf8a.exe"C:\Users\Admin\AppData\Local\Temp\b855f795a9bf03ab46a373dc09066ac18994a0603101e40b3a0fa3b0959caf8a.exe"1⤵
- Checks BIOS information in registry
- Modifies registry class
PID:1688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1688 -s 11362⤵
- Program crash
PID:1236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1688 -ip 16881⤵PID:4828