Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2023, 04:05
Static task
static1
Behavioral task
behavioral1
Sample
943543daaa321ea04b8002ca12102484e06d3dbd912d67fe93ada07379838f7f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
943543daaa321ea04b8002ca12102484e06d3dbd912d67fe93ada07379838f7f.exe
Resource
win10v2004-20230220-en
General
-
Target
943543daaa321ea04b8002ca12102484e06d3dbd912d67fe93ada07379838f7f.exe
-
Size
4.9MB
-
MD5
b9d71891e236be1aeed9b9a6a99dc8ce
-
SHA1
0c82d8368887478652c3d1049b6c211ba51b235c
-
SHA256
943543daaa321ea04b8002ca12102484e06d3dbd912d67fe93ada07379838f7f
-
SHA512
f8559c3392701a063e59444f916a971baf4a9691925f8b368d1906f249e9fbe458af573b80d4d311ff3e47d849b5d1a88ee9e1fdec16afd34eaeb1faaf3a6a3f
-
SSDEEP
98304:gu0gmbyldTpymEiaWIfx73bSl8GBUkMJpHTYYdVY7vM16E3GqlfiTv:f0gxv1ENLLSaGekwTYYdiZE3GqlE
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 943543daaa321ea04b8002ca12102484e06d3dbd912d67fe93ada07379838f7f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBIOSDate 943543daaa321ea04b8002ca12102484e06d3dbd912d67fe93ada07379838f7f.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 943543daaa321ea04b8002ca12102484e06d3dbd912d67fe93ada07379838f7f.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBIOSDate 943543daaa321ea04b8002ca12102484e06d3dbd912d67fe93ada07379838f7f.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2180 wrote to memory of 4424 2180 943543daaa321ea04b8002ca12102484e06d3dbd912d67fe93ada07379838f7f.exe 85 PID 2180 wrote to memory of 4424 2180 943543daaa321ea04b8002ca12102484e06d3dbd912d67fe93ada07379838f7f.exe 85 PID 2180 wrote to memory of 4424 2180 943543daaa321ea04b8002ca12102484e06d3dbd912d67fe93ada07379838f7f.exe 85 PID 4424 wrote to memory of 4832 4424 cmd.exe 87 PID 4424 wrote to memory of 4832 4424 cmd.exe 87 PID 4424 wrote to memory of 4832 4424 cmd.exe 87 PID 4832 wrote to memory of 3828 4832 net.exe 88 PID 4832 wrote to memory of 3828 4832 net.exe 88 PID 4832 wrote to memory of 3828 4832 net.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\943543daaa321ea04b8002ca12102484e06d3dbd912d67fe93ada07379838f7f.exe"C:\Users\Admin\AppData\Local\Temp\943543daaa321ea04b8002ca12102484e06d3dbd912d67fe93ada07379838f7f.exe"1⤵
- Checks BIOS information in registry
- Writes to the Master Boot Record (MBR)
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop Spooler2⤵
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\net.exenet stop Spooler3⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Spooler4⤵PID:3828
-
-
-