Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
323s -
max time network
357s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 06:00
Behavioral task
behavioral1
Sample
efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe
Resource
win10v2004-20221111-en
General
-
Target
efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe
-
Size
536KB
-
MD5
092fbe119af659bc1634cb3d79f94509
-
SHA1
1077b24731f26e1452b582ef9051537ea4bf7c6a
-
SHA256
efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849
-
SHA512
0d2fff764acb7f261d8e22d823d75b6d070746970e357f09056e41a333d9b44b42f7f00235d160606a6be415e0dd077ecd7443e115d4f8e223698b525db422b3
-
SSDEEP
6144:e/IRL3N/LoBZEPrfwf7VcCvpICvHHnlhWzxwgIJPLNGTfKe8i/q4k2JgLKQc0:e/IRBLoBArIJoxwgIJPLNYPvk2FD0
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4428-132-0x0000000000400000-0x0000000000487000-memory.dmp upx -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\h: efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe File opened (read-only) \??\n: efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe File opened (read-only) \??\o: efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe File opened (read-only) \??\w: efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe File opened (read-only) \??\z: efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe File opened (read-only) \??\f: efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe File opened (read-only) \??\g: efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe File opened (read-only) \??\j: efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe File opened (read-only) \??\l: efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe File opened (read-only) \??\p: efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe File opened (read-only) \??\r: efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe File opened (read-only) \??\u: efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe File opened (read-only) \??\v: efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe File opened (read-only) \??\y: efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe File opened (read-only) \??\i: efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe File opened (read-only) \??\k: efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe File opened (read-only) \??\m: efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe File opened (read-only) \??\q: efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe File opened (read-only) \??\s: efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe File opened (read-only) \??\t: efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe File opened (read-only) \??\x: efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe File opened (read-only) \??\e: efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 efe11717d058562a7cacf0aea0f919d0b36d0686967a6ba3f2059785bf9f9849.exe