Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
112s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2023, 07:15
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
52KB
-
MD5
07f3628d2747c44aec6e84c98f115ec1
-
SHA1
b1cac002755723fb40d82b64667b107578f35db6
-
SHA256
640cbf791400685def29d0ad24e89e1c7346bd87b1beeb8e2f8adf45f7ac9004
-
SHA512
299a36ededa9a723cb1b40a7377ee4fa395bbd65d17e54f2e67f74af9386d7465924ad06e70acdda1b4af7497c6ab71b559337f24059cc85e20b3e2aead1d2f5
-
SSDEEP
768:9s47GGqonHVCLuH+EGgmWJQ2vmrGZlxitjg:9s4uYELu/GgmHodytjg
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3140-135-0x0000000010000000-0x0000000010193000-memory.dmp upx behavioral2/memory/3140-139-0x0000000010000000-0x0000000010193000-memory.dmp upx behavioral2/memory/3140-138-0x0000000010000000-0x0000000010193000-memory.dmp upx behavioral2/memory/3140-140-0x0000000010000000-0x0000000010193000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: tmp.exe File opened (read-only) \??\Q: tmp.exe File opened (read-only) \??\U: tmp.exe File opened (read-only) \??\X: tmp.exe File opened (read-only) \??\Y: tmp.exe File opened (read-only) \??\F: tmp.exe File opened (read-only) \??\H: tmp.exe File opened (read-only) \??\N: tmp.exe File opened (read-only) \??\O: tmp.exe File opened (read-only) \??\S: tmp.exe File opened (read-only) \??\Z: tmp.exe File opened (read-only) \??\I: tmp.exe File opened (read-only) \??\J: tmp.exe File opened (read-only) \??\K: tmp.exe File opened (read-only) \??\R: tmp.exe File opened (read-only) \??\T: tmp.exe File opened (read-only) \??\B: tmp.exe File opened (read-only) \??\L: tmp.exe File opened (read-only) \??\M: tmp.exe File opened (read-only) \??\W: tmp.exe File opened (read-only) \??\E: tmp.exe File opened (read-only) \??\G: tmp.exe File opened (read-only) \??\V: tmp.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz tmp.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 3140 tmp.exe 3140 tmp.exe 3140 tmp.exe 3140 tmp.exe 3140 tmp.exe 3140 tmp.exe 3140 tmp.exe 3140 tmp.exe 3140 tmp.exe 3140 tmp.exe 3140 tmp.exe 3140 tmp.exe 3140 tmp.exe 3140 tmp.exe 3140 tmp.exe 3140 tmp.exe 3140 tmp.exe 3140 tmp.exe 3140 tmp.exe 3140 tmp.exe 3140 tmp.exe 3140 tmp.exe 3140 tmp.exe 3140 tmp.exe