Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
41534447f7279880c73f606a4a3b469c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
41534447f7279880c73f606a4a3b469c.exe
Resource
win10v2004-20231215-en
General
-
Target
41534447f7279880c73f606a4a3b469c.exe
-
Size
1.6MB
-
MD5
41534447f7279880c73f606a4a3b469c
-
SHA1
446aa35ff703995042df4ccb6a6a3240f31a99d8
-
SHA256
e1754f93f15c5d36ab0bea9baa22ba8108170f8f641f67bdab449a707572bd63
-
SHA512
40b06b65f9f4fb5eb4bbd8b59de79c73d4a8ab18a288b97b8207a017db8e917a036575840567505a35c968714a0dc7825784a73e5cff3f70c0ed938bd6d52fca
-
SSDEEP
49152:Z9pkT//LEkPUf3ywg/UsbjC/uXSSKepjeY/Lky:ZALrUf3ywgssjC/uXVjeA
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 41534447f7279880c73f606a4a3b469c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 41534447f7279880c73f606a4a3b469c.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{165CEC4B-0154-C08B-E0B3-58CDC5653271} 41534447f7279880c73f606a4a3b469c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{165CEC4B-0154-C08B-E0B3-58CDC5653271}\AppID = "{03e15b2e-cca6-451c-8fb0-1e2ee37a27dd}" 41534447f7279880c73f606a4a3b469c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{165CEC4B-0154-C08B-E0B3-58CDC5653271}\LocalizedString = "@%systemroot%\\system32\\tapiui.dll,-1" 41534447f7279880c73f606a4a3b469c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{165CEC4B-0154-C08B-E0B3-58CDC5653271}\Elevation 41534447f7279880c73f606a4a3b469c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{165CEC4B-0154-C08B-E0B3-58CDC5653271}\Elevation\IconReference = "@%systemroot%\\system32\\tapiui.dll,-201" 41534447f7279880c73f606a4a3b469c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{165CEC4B-0154-C08B-E0B3-58CDC5653271}\InprocServer32 41534447f7279880c73f606a4a3b469c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{165CEC4B-0154-C08B-E0B3-58CDC5653271}\ = "CTapiLuaLib Class" 41534447f7279880c73f606a4a3b469c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{165CEC4B-0154-C08B-E0B3-58CDC5653271}\Elevation\ 41534447f7279880c73f606a4a3b469c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{165CEC4B-0154-C08B-E0B3-58CDC5653271}\Elevation\Enabled = "1" 41534447f7279880c73f606a4a3b469c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{165CEC4B-0154-C08B-E0B3-58CDC5653271}\InprocServer32\ = "%systemroot%\\SysWow64\\tapilua.dll" 41534447f7279880c73f606a4a3b469c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{165CEC4B-0154-C08B-E0B3-58CDC5653271}\InprocServer32\ThreadingModel = "Apartment" 41534447f7279880c73f606a4a3b469c.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3312 41534447f7279880c73f606a4a3b469c.exe Token: SeIncBasePriorityPrivilege 3312 41534447f7279880c73f606a4a3b469c.exe