Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
79s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 18:45
Behavioral task
behavioral1
Sample
e7fa649ccf7121c1743789b56955a80100e76d3ee313452a5f5b076776abba8c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e7fa649ccf7121c1743789b56955a80100e76d3ee313452a5f5b076776abba8c.exe
Resource
win10v2004-20220901-en
General
-
Target
e7fa649ccf7121c1743789b56955a80100e76d3ee313452a5f5b076776abba8c.exe
-
Size
171KB
-
MD5
7d27c983d94e510086a579a7d3490150
-
SHA1
4851b5a8b462f3eafe6c6067870a0cd5631a7437
-
SHA256
e7fa649ccf7121c1743789b56955a80100e76d3ee313452a5f5b076776abba8c
-
SHA512
e5988ddb306f2d31ac8e9ff1bfb76c4b925806c3c69c0fec918d60d5b91dd8bb588ff8a748521ef57217c50d02d0eb04e92d0956c9ca5e30b7ce379e5dd4f547
-
SSDEEP
3072:ku45GsDsjRBxVQPBNMqr7N9yh3ks4bYQUzatVFpkl5XwuR99D1svDXuhtdBqAaVe:klUQLjSh3lMBpGR9VIXutAAaDvoSm
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1520-54-0x0000000000400000-0x0000000000444000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum e7fa649ccf7121c1743789b56955a80100e76d3ee313452a5f5b076776abba8c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 e7fa649ccf7121c1743789b56955a80100e76d3ee313452a5f5b076776abba8c.exe