Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
98s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 19:04
Static task
static1
Behavioral task
behavioral1
Sample
e8afc21fe453fbf2146788a82eac688e2b74c727f78cf76ba576c72b4fd0d631.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e8afc21fe453fbf2146788a82eac688e2b74c727f78cf76ba576c72b4fd0d631.exe
Resource
win10v2004-20220812-en
General
-
Target
e8afc21fe453fbf2146788a82eac688e2b74c727f78cf76ba576c72b4fd0d631.exe
-
Size
96KB
-
MD5
0782aa74000ffeee6d65723f221c4afb
-
SHA1
941f1bb046dbef8f68e60f31dd18f84a54520548
-
SHA256
e8afc21fe453fbf2146788a82eac688e2b74c727f78cf76ba576c72b4fd0d631
-
SHA512
4fa910a9a0d60763fdee9d137e60dc63b75faa07b1216c28bc7f6bafa248d38807265ebf492ca9febe9e442e1db93a35359e5e81eb6863551d0b3dfb428f2842
-
SSDEEP
1536:ErvTbNcnj8hngEGNnJLqQxBAKEjy5OZDj/FA/:EfC8h3wnJLqaBAKEj0OZDa/
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\System\wins.txt e8afc21fe453fbf2146788a82eac688e2b74c727f78cf76ba576c72b4fd0d631.exe File opened for modification C:\Windows\System\wins.txt e8afc21fe453fbf2146788a82eac688e2b74c727f78cf76ba576c72b4fd0d631.exe File opened for modification \??\c:\windows\resim.jpg e8afc21fe453fbf2146788a82eac688e2b74c727f78cf76ba576c72b4fd0d631.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 e8afc21fe453fbf2146788a82eac688e2b74c727f78cf76ba576c72b4fd0d631.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier e8afc21fe453fbf2146788a82eac688e2b74c727f78cf76ba576c72b4fd0d631.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1936 reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1444 e8afc21fe453fbf2146788a82eac688e2b74c727f78cf76ba576c72b4fd0d631.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1936 1444 e8afc21fe453fbf2146788a82eac688e2b74c727f78cf76ba576c72b4fd0d631.exe 27 PID 1444 wrote to memory of 1936 1444 e8afc21fe453fbf2146788a82eac688e2b74c727f78cf76ba576c72b4fd0d631.exe 27 PID 1444 wrote to memory of 1936 1444 e8afc21fe453fbf2146788a82eac688e2b74c727f78cf76ba576c72b4fd0d631.exe 27 PID 1444 wrote to memory of 1936 1444 e8afc21fe453fbf2146788a82eac688e2b74c727f78cf76ba576c72b4fd0d631.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8afc21fe453fbf2146788a82eac688e2b74c727f78cf76ba576c72b4fd0d631.exe"C:\Users\Admin\AppData\Local\Temp\e8afc21fe453fbf2146788a82eac688e2b74c727f78cf76ba576c72b4fd0d631.exe"1⤵
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\reg.exereg add hkcu\software\microsoft\windows\currentversion\policies\system /v disabletaskmgr /t reg_dword /d "1" /f2⤵
- Modifies registry key
PID:1936
-