Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
128s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
26/11/2023, 04:34
Static task
static1
General
-
Target
7622fc8bbc24b2a897785d26cf343d51e1e89faf35783b658ff7b075d4686a81.exe
-
Size
288KB
-
MD5
788ca5ac905268a5534c3aad4c20d710
-
SHA1
b06023f70dfa9e2e09267c6741a0fe6711d984b1
-
SHA256
7622fc8bbc24b2a897785d26cf343d51e1e89faf35783b658ff7b075d4686a81
-
SHA512
51a36faa8dd5cb6f579058952b59458cb07597a199c8c1d923eda4582e16ab005d9d6e07fdfc3e8ce7b2a7b27f923884b082b9e20febb3b42b19772863b1509b
-
SSDEEP
3072:T7iTepdVldLBUv/s217EfSXKAzV9E/7HMYUtWQ5mgDypp5kVyBk3eFx/RiPB:niipnld6p170+4MFtWqyn+
Malware Config
Signatures
-
Downloads MZ/PE file
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7622fc8bbc24b2a897785d26cf343d51e1e89faf35783b658ff7b075d4686a81.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7622fc8bbc24b2a897785d26cf343d51e1e89faf35783b658ff7b075d4686a81.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3128 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4164 7622fc8bbc24b2a897785d26cf343d51e1e89faf35783b658ff7b075d4686a81.exe 4164 7622fc8bbc24b2a897785d26cf343d51e1e89faf35783b658ff7b075d4686a81.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4164 wrote to memory of 312 4164 7622fc8bbc24b2a897785d26cf343d51e1e89faf35783b658ff7b075d4686a81.exe 72 PID 4164 wrote to memory of 312 4164 7622fc8bbc24b2a897785d26cf343d51e1e89faf35783b658ff7b075d4686a81.exe 72 PID 4164 wrote to memory of 312 4164 7622fc8bbc24b2a897785d26cf343d51e1e89faf35783b658ff7b075d4686a81.exe 72 PID 312 wrote to memory of 3128 312 cmd.exe 74 PID 312 wrote to memory of 3128 312 cmd.exe 74 PID 312 wrote to memory of 3128 312 cmd.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\7622fc8bbc24b2a897785d26cf343d51e1e89faf35783b658ff7b075d4686a81.exe"C:\Users\Admin\AppData\Local\Temp\7622fc8bbc24b2a897785d26cf343d51e1e89faf35783b658ff7b075d4686a81.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7622fc8bbc24b2a897785d26cf343d51e1e89faf35783b658ff7b075d4686a81.exe" & del "C:\ProgramData\*.dll"" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:3128
-
-