Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
5Static
static
1skins.rar
windows7-x64
3skins.rar
windows10-2004-x64
3skins/030f...57.png
windows7-x64
3skins/030f...57.png
windows10-2004-x64
3skins/047c...e9.png
windows7-x64
3skins/047c...e9.png
windows10-2004-x64
3skins/06be...d1.png
windows7-x64
3skins/06be...d1.png
windows10-2004-x64
3skins/0705...b0.png
windows7-x64
3skins/0705...b0.png
windows10-2004-x64
3skins/09c8...ba.png
windows7-x64
3skins/09c8...ba.png
windows10-2004-x64
3skins/0a4b...c0.png
windows7-x64
3skins/0a4b...c0.png
windows10-2004-x64
3skins/0c3c...d2.png
windows7-x64
3skins/0c3c...d2.png
windows10-2004-x64
3skins/0e0a...b2.png
windows7-x64
3skins/0e0a...b2.png
windows10-2004-x64
3skins/10e4...7b.png
windows7-x64
3skins/10e4...7b.png
windows10-2004-x64
3skins/1321...a9.png
windows7-x64
3skins/1321...a9.png
windows10-2004-x64
3skins/151e...75.png
windows7-x64
3skins/151e...75.png
windows10-2004-x64
3skins/15a3...b8.png
windows7-x64
3skins/15a3...b8.png
windows10-2004-x64
3skins/1884...17.png
windows7-x64
3skins/1884...17.png
windows10-2004-x64
5skins/189a...b1.png
windows7-x64
3skins/189a...b1.png
windows10-2004-x64
3skins/1a20...c3.png
windows7-x64
3skins/1a20...c3.png
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2023, 21:45
Static task
static1
Behavioral task
behavioral1
Sample
skins.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
skins.rar
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
skins/030fc6bdae489357.png
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
skins/030fc6bdae489357.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
skins/047c58d59a5396e9.png
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
skins/047c58d59a5396e9.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
skins/06be8996e28902d1.png
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
skins/06be8996e28902d1.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
skins/0705ac440d04e5b0.png
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
skins/0705ac440d04e5b0.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
skins/09c83eb3eafad0ba.png
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
skins/09c83eb3eafad0ba.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
skins/0a4b8674c278c3c0.png
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
skins/0a4b8674c278c3c0.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
skins/0c3c3596460a44d2.png
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
skins/0c3c3596460a44d2.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
skins/0e0a2865865b67b2.png
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
skins/0e0a2865865b67b2.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
skins/10e42cd5f924cb7b.png
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
skins/10e42cd5f924cb7b.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
skins/132158fa0c74f9a9.png
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
skins/132158fa0c74f9a9.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
skins/151e2fc11f9d7a75.png
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
skins/151e2fc11f9d7a75.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
skins/15a3a4dc2f5d91b8.png
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
skins/15a3a4dc2f5d91b8.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
skins/18849ab0bea52f17.png
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
skins/18849ab0bea52f17.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral29
Sample
skins/189a6409477ec6b1.png
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
skins/189a6409477ec6b1.png
Resource
win10v2004-20230221-en
Behavioral task
behavioral31
Sample
skins/1a206ad825e4c3c3.png
Resource
win7-20230220-en
Behavioral task
behavioral32
Sample
skins/1a206ad825e4c3c3.png
Resource
win10v2004-20230220-en
General
-
Target
skins/18849ab0bea52f17.png
-
Size
880B
-
MD5
00e59080edd645eec88a93e011531814
-
SHA1
a2d41d5273d535744f090690fdda2bbe63141f4e
-
SHA256
6e9acf1247200383b3acd92e0097fcef84c7a93dd76bd1a1b9fdced1b0775495
-
SHA512
c7a639943c62ee7c081a90841080c730891109d9b3275b2bc76a360dbb21e8d185a0e089058431f55bae84014c6362ed5379eab7fce2445ae5991a81ba58e9e0
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{638201BB-3E60-40D4-8516-26C207F7A2AC}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{B0A2EC07-4871-4BE1-AF7D-724A78A4A71C}.catalogItem svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\skins\18849ab0bea52f17.png1⤵PID:2668
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:4692