Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 22:09
Static task
static1
Behavioral task
behavioral1
Sample
14b420c4bfb7c053c792a5c7ff04c805.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14b420c4bfb7c053c792a5c7ff04c805.exe
Resource
win10v2004-20231215-en
General
-
Target
14b420c4bfb7c053c792a5c7ff04c805.exe
-
Size
258KB
-
MD5
14b420c4bfb7c053c792a5c7ff04c805
-
SHA1
d2e6aa55158a76d3edb1530a37ab17fd47da5885
-
SHA256
108e5414ab38ddb5d836da10b231871b7f42b6de87eb2856ee86d8cf2a452d23
-
SHA512
335953388d73bb48d4d656c3af7a5ec17a7a6077be40e0ff004196957f46a40368c7926f074de33559f3a6531b06273e64181055bf80cae3b8b5fccfd93f5161
-
SSDEEP
3072:Bm/T0erxWohbvV442DEBJw1Xx/1S/f+hSoXPt4QnriDIsHsI7nHdMFBf8yD2nvf5:BK0eYoNZZJgRQerHwIfunHdM8yD2nvh
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 14b420c4bfb7c053c792a5c7ff04c805.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 14b420c4bfb7c053c792a5c7ff04c805.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Newsful.job 14b420c4bfb7c053c792a5c7ff04c805.exe