Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
18/11/2023, 06:00
Behavioral task
behavioral1
Sample
303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe
Resource
win10v2004-20231023-en
General
-
Target
303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe
-
Size
10.8MB
-
MD5
ff62c2105b960fbff6ec5cc203aff965
-
SHA1
142d965f2b888ea2af3ef52973779761725534fc
-
SHA256
303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53
-
SHA512
b6a674ed06b6a9ba1eef5db2b2674b2a2940046f45c095341333b8bf17d46d97b5e7a519529c270e757bb514cd0bf1656d90c09f4523fff2110dc254f15fafd7
-
SSDEEP
196608:iKZVvRdoXHRgBhMq1Iu7LXTcm5/h+djK3Bak3emVtWYnzXpLWG3rKl:pVvAXxg3ME7fdh+K3BakDzhTK
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe File opened (read-only) \??\P: 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe File opened (read-only) \??\Z: 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe File opened (read-only) \??\G: 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe File opened (read-only) \??\H: 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe File opened (read-only) \??\M: 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe File opened (read-only) \??\S: 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe File opened (read-only) \??\U: 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe File opened (read-only) \??\V: 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe File opened (read-only) \??\Y: 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe File opened (read-only) \??\B: 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe File opened (read-only) \??\J: 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe File opened (read-only) \??\L: 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe File opened (read-only) \??\O: 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe File opened (read-only) \??\R: 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe File opened (read-only) \??\T: 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe File opened (read-only) \??\W: 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe File opened (read-only) \??\A: 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe File opened (read-only) \??\I: 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe File opened (read-only) \??\Q: 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe File opened (read-only) \??\X: 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe File opened (read-only) \??\E: 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe File opened (read-only) \??\N: 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2672 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2108 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe 2108 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2672 2108 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe 28 PID 2108 wrote to memory of 2672 2108 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe 28 PID 2108 wrote to memory of 2672 2108 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe 28 PID 2108 wrote to memory of 2672 2108 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe 28 PID 2108 wrote to memory of 2672 2108 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe 28 PID 2108 wrote to memory of 2672 2108 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe 28 PID 2108 wrote to memory of 2672 2108 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe 28 PID 2108 wrote to memory of 2672 2108 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe 28 PID 2108 wrote to memory of 2672 2108 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe 28 PID 2108 wrote to memory of 2672 2108 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe 28 PID 2108 wrote to memory of 2672 2108 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe 28 PID 2108 wrote to memory of 2672 2108 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe 28 PID 2108 wrote to memory of 2672 2108 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe 28 PID 2108 wrote to memory of 2672 2108 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe 28 PID 2108 wrote to memory of 2672 2108 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe 28 PID 2108 wrote to memory of 2672 2108 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe 28 PID 2108 wrote to memory of 2672 2108 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe 28 PID 2108 wrote to memory of 2672 2108 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe 28 PID 2108 wrote to memory of 2672 2108 303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe"C:\Users\Admin\AppData\Local\Temp\303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe"C:\Users\Admin\AppData\Local\Temp\303c097eecd19855079bd63d185624ea7b7388efb5a0a2ac9ea7cb5d0d4a2e53.exe"2⤵
- Enumerates connected drives
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
PID:2672
-