Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 22:37
Behavioral task
behavioral1
Sample
40c8f46ac1dc9853c51ddac0ac5fd515.exe
Resource
win7-20231215-en
General
-
Target
40c8f46ac1dc9853c51ddac0ac5fd515.exe
-
Size
676KB
-
MD5
40c8f46ac1dc9853c51ddac0ac5fd515
-
SHA1
3fb2f09c135a0e44cd301d6c15a57dcfd7f31d5b
-
SHA256
1683e165b748a3ada2eb07d80fa64e77608a00f35de1ee1b40afbf53355133ed
-
SHA512
aa05a0dbf39dd45dc7987e93048872248cdff5d92fb059584b0e297714bf9da29bcd1f6ef45e8065bd087c7d195ccf18d33761e95a1558ab50c189bc37608eca
-
SSDEEP
12288:LQ+8YcSdcdp7GqDd7o4YINDz6/AAgYShiuFfIihBtwVabCMUA4+6vlF7m:5iSmrpDd75d68hiuF5H8abCMUN+YlFi
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 40c8f46ac1dc9853c51ddac0ac5fd515.exe -
resource yara_rule behavioral2/memory/1648-0-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral2/memory/1648-4-0x0000000000400000-0x00000000005CC000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 40c8f46ac1dc9853c51ddac0ac5fd515.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 40c8f46ac1dc9853c51ddac0ac5fd515.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2748 1648 WerFault.exe 14 1244 1648 WerFault.exe 14 -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1648 40c8f46ac1dc9853c51ddac0ac5fd515.exe 1648 40c8f46ac1dc9853c51ddac0ac5fd515.exe 1648 40c8f46ac1dc9853c51ddac0ac5fd515.exe 1648 40c8f46ac1dc9853c51ddac0ac5fd515.exe 1648 40c8f46ac1dc9853c51ddac0ac5fd515.exe 1648 40c8f46ac1dc9853c51ddac0ac5fd515.exe 1648 40c8f46ac1dc9853c51ddac0ac5fd515.exe 1648 40c8f46ac1dc9853c51ddac0ac5fd515.exe 1648 40c8f46ac1dc9853c51ddac0ac5fd515.exe 1648 40c8f46ac1dc9853c51ddac0ac5fd515.exe 1648 40c8f46ac1dc9853c51ddac0ac5fd515.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\40c8f46ac1dc9853c51ddac0ac5fd515.exe"C:\Users\Admin\AppData\Local\Temp\40c8f46ac1dc9853c51ddac0ac5fd515.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:1648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 19002⤵
- Program crash
PID:2748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 27802⤵
- Program crash
PID:1244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1648 -ip 16481⤵PID:3316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1648 -ip 16481⤵PID:4504