Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 21:22
Behavioral task
behavioral1
Sample
12d6727f76164e3f76e9ce830267247c.exe
Resource
win7-20231215-en
General
-
Target
12d6727f76164e3f76e9ce830267247c.exe
-
Size
666KB
-
MD5
12d6727f76164e3f76e9ce830267247c
-
SHA1
d825a70c24384ba9f4448e742f03c6c4a9910486
-
SHA256
6633c65c4e938fb67294a6fb475d6ccd71cec9407923a67388eb3c2dc1944d55
-
SHA512
6f0fac88b8872ae56480104cd06e47c32204f8149d9f05d7b138d86220cc489048dfc4e73d1cb563862fb7c2eab830c719ab1b647d897360f1e4dea52c6e142a
-
SSDEEP
12288:ybDqEkMs4q48IAeP0PifTEurPbvdqJplapLWTICNIYPKMTWN4t4OAUw91zRwIMfX:yXbs48LeP0P8E6dclWLi26KGOqMwIM/
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 12d6727f76164e3f76e9ce830267247c.exe -
resource yara_rule behavioral1/memory/2420-0-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2420-22-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2420-23-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2420-24-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2420-25-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2420-26-0x0000000000400000-0x00000000005C7000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 12d6727f76164e3f76e9ce830267247c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 12d6727f76164e3f76e9ce830267247c.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main 12d6727f76164e3f76e9ce830267247c.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2420 12d6727f76164e3f76e9ce830267247c.exe 2420 12d6727f76164e3f76e9ce830267247c.exe 2420 12d6727f76164e3f76e9ce830267247c.exe 2420 12d6727f76164e3f76e9ce830267247c.exe 2420 12d6727f76164e3f76e9ce830267247c.exe 2420 12d6727f76164e3f76e9ce830267247c.exe 2420 12d6727f76164e3f76e9ce830267247c.exe 2420 12d6727f76164e3f76e9ce830267247c.exe 2420 12d6727f76164e3f76e9ce830267247c.exe 2420 12d6727f76164e3f76e9ce830267247c.exe 2420 12d6727f76164e3f76e9ce830267247c.exe 2420 12d6727f76164e3f76e9ce830267247c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12d6727f76164e3f76e9ce830267247c.exe"C:\Users\Admin\AppData\Local\Temp\12d6727f76164e3f76e9ce830267247c.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420