Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2023, 10:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Stub.exe
Resource
win7-20230705-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
Stub.exe
Resource
win10v2004-20230703-en
5 signatures
150 seconds
General
-
Target
Stub.exe
-
Size
27KB
-
MD5
3003ca8bbdde3b4e9ecf6c78771751be
-
SHA1
d139feb95ef22f87a200fe11c398d1646f0b5d8e
-
SHA256
0895e5c8354d90cd47dfd9b0f92d400ba0675e2467f01d6d4714344345afe931
-
SHA512
e0348cf8f833711eed4b8b64fa86b1edbdc9083161548e0942521a9dc2e33f8bf40aa8c66c3602224fc08acbf532faef79d18edf2c9e4f928989577d708ed229
-
SSDEEP
384:BEnPsCz5L+5g8NvD4CUKrNbktPhvS2TeKQNf8TkA/4E/q+LRmDTHOiux5mfLS+oK:2nPsOf8NvDHFNb4S2T+NfQziO3K
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 4928 dw20.exe Token: SeBackupPrivilege 4928 dw20.exe Token: SeBackupPrivilege 4928 dw20.exe Token: SeBackupPrivilege 4928 dw20.exe Token: SeBackupPrivilege 4928 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3316 wrote to memory of 4928 3316 Stub.exe 86 PID 3316 wrote to memory of 4928 3316 Stub.exe 86 PID 3316 wrote to memory of 4928 3316 Stub.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Stub.exe"C:\Users\Admin\AppData\Local\Temp\Stub.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8482⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4928
-