Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2023, 19:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
创建所有数据更新包.exe
Resource
win7-20230220-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
创建所有数据更新包.exe
Resource
win10v2004-20230220-en
5 signatures
150 seconds
General
-
Target
创建所有数据更新包.exe
-
Size
28KB
-
MD5
54c1be58fa540a4b72b092ece85a97ee
-
SHA1
6843bc6cc65fc6c3a5e4524a921f7ff93d408a32
-
SHA256
26f4c8737102d981ec46fc892ab726dcaf4c8ad3c84602680c52601738a74e5a
-
SHA512
8ffdc2980d9cf1bf5b3e5d336ed5efa414696952ed355bd36b785c0d08ac49cac6b8b403d36b926cf0aec68fb7c60dd58a9fe441904d1b7227cbee5f18c7f68e
-
SSDEEP
384:Mp7jP9tP2VRrTsklOuQBcBa5Xg+yIGhKv7QMvI96ua96uoGy+6B5gqz5dt69Zuxj:+tktIiKsx+6/9JVHDrT
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1392 创建所有数据更新包.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1392 创建所有数据更新包.exe Token: SeBackupPrivilege 2152 dw20.exe Token: SeBackupPrivilege 2152 dw20.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1392 wrote to memory of 2152 1392 创建所有数据更新包.exe 83 PID 1392 wrote to memory of 2152 1392 创建所有数据更新包.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\创建所有数据更新包.exe"C:\Users\Admin\AppData\Local\Temp\创建所有数据更新包.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 8162⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2152
-