Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1201s -
max time network
1220s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
16/11/2023, 21:44
Static task
static1
Behavioral task
behavioral1
Sample
EJJU4554FacURVGtu7241raQGKE75657283.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
EJJU4554FacURVGtu7241raQGKE75657283.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
___________________________________________311842341293.dll
Resource
win7-20231020-en
Behavioral task
behavioral4
Sample
___________________________________________311842341293.dll
Resource
win10v2004-20231020-en
General
-
Target
EJJU4554FacURVGtu7241raQGKE75657283.exe
-
Size
122.5MB
-
MD5
fa50909ae6f2371353eaa943ee7e4801
-
SHA1
5f6b71f06802866b4725a20c9023dfd430f2ee80
-
SHA256
3ff3d891aa19bbece7a89637f05009cf8f3c0663a9d54d6f08fa63ffc742b74a
-
SHA512
84170f600e1c4611b4656ab15d2bcd1d43225d9f8dde9f0326c56e97349634a7e3a79bfd5212a36cd84502817fa66992ac393fa5e22be76683484737273d8edf
-
SSDEEP
98304:jg3h79INSz4zmf5+H+V9fj5uAhO5qdH5R5Fb:8R7mCMtAgMdH5n
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EJJU4554FacURVGtu7241raQGKE75657283.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EJJU4554FacURVGtu7241raQGKE75657283.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EJJU4554FacURVGtu7241raQGKE75657283.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer EJJU4554FacURVGtu7241raQGKE75657283.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName EJJU4554FacURVGtu7241raQGKE75657283.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion EJJU4554FacURVGtu7241raQGKE75657283.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2648 EJJU4554FacURVGtu7241raQGKE75657283.exe 2648 EJJU4554FacURVGtu7241raQGKE75657283.exe 2648 EJJU4554FacURVGtu7241raQGKE75657283.exe