Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 00:41 UTC
Static task
static1
Behavioral task
behavioral1
Sample
1dabe1d6365a69240cc665e70cda4725.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1dabe1d6365a69240cc665e70cda4725.exe
Resource
win10v2004-20231215-en
General
-
Target
1dabe1d6365a69240cc665e70cda4725.exe
-
Size
1.0MB
-
MD5
1dabe1d6365a69240cc665e70cda4725
-
SHA1
442c421432cb782e4286c310c184707fa9efbf22
-
SHA256
7bf404fe1bb92df0c7ae61277bc6f64d8762ee12f7ad548eb3162e98af912c2d
-
SHA512
048931d2cb3dc0cf18196ef1c326ddcb4d4ff43f210570ef5977ba259fd2885de01ce434b80b259410642eb79967648235c570d97ba42a2571274e5b6df3cbf0
-
SSDEEP
24576:ElgtHhqdaSb8wQaAfiz+uo6hsE2FwzOQyOXHYrh5z5O71PEbHO:E6tHodaYiaQPuoPGU3IRPEa
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\DegCs.exe 1dabe1d6365a69240cc665e70cda4725.exe File opened for modification C:\Windows\SysWOW64\drivers\DegCs.exe 1dabe1d6365a69240cc665e70cda4725.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1dabe1d6365a69240cc665e70cda4725.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Wine 1dabe1d6365a69240cc665e70cda4725.exe