Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 01:01
Behavioral task
behavioral1
Sample
1ee61b189558853f1887f339c1aa74ba.exe
Resource
win7-20231215-en
General
-
Target
1ee61b189558853f1887f339c1aa74ba.exe
-
Size
681KB
-
MD5
1ee61b189558853f1887f339c1aa74ba
-
SHA1
2a3b4572cadb16e866aee8fedbb868616c1af566
-
SHA256
11255f1d01414bb99fc53bdbf862e47bf206a1712f3cce8dced9ce9f076326e2
-
SHA512
9401a2fdc8f949fcda384a8a079b8d1c85b14cf51f19372f7109600f84a8c52c138b51d16b95292d6fb442cb5364ec5b247e671b60df3a3d1b1d2771a0183733
-
SSDEEP
12288:cwEZxZLDznQwo5unUeArTE5yjgcy7LxOuH9/7HPuXRZ8dzfPtfdeEvnrvdXZPTh3:LEZxZLHnQwOunXLpvwuVbKz81VfTFXZV
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1ee61b189558853f1887f339c1aa74ba.exe -
resource yara_rule behavioral1/memory/3020-0-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/3020-37-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/3020-38-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/3020-39-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/3020-40-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/3020-41-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/3020-42-0x0000000000400000-0x00000000005CC000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 1ee61b189558853f1887f339c1aa74ba.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 1ee61b189558853f1887f339c1aa74ba.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main 1ee61b189558853f1887f339c1aa74ba.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 3020 1ee61b189558853f1887f339c1aa74ba.exe 3020 1ee61b189558853f1887f339c1aa74ba.exe 3020 1ee61b189558853f1887f339c1aa74ba.exe 3020 1ee61b189558853f1887f339c1aa74ba.exe 3020 1ee61b189558853f1887f339c1aa74ba.exe 3020 1ee61b189558853f1887f339c1aa74ba.exe 3020 1ee61b189558853f1887f339c1aa74ba.exe 3020 1ee61b189558853f1887f339c1aa74ba.exe 3020 1ee61b189558853f1887f339c1aa74ba.exe 3020 1ee61b189558853f1887f339c1aa74ba.exe 3020 1ee61b189558853f1887f339c1aa74ba.exe 3020 1ee61b189558853f1887f339c1aa74ba.exe 3020 1ee61b189558853f1887f339c1aa74ba.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ee61b189558853f1887f339c1aa74ba.exe"C:\Users\Admin\AppData\Local\Temp\1ee61b189558853f1887f339c1aa74ba.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d