Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 01:22
Behavioral task
behavioral1
Sample
202be69a05f98db6bf4f86ed7203607d.exe
Resource
win7-20231215-en
General
-
Target
202be69a05f98db6bf4f86ed7203607d.exe
-
Size
666KB
-
MD5
202be69a05f98db6bf4f86ed7203607d
-
SHA1
98039bf0d3141fdbc391ae47845bf7abbc6b32c7
-
SHA256
65eb63db0866dbd22c965a6f24db315bd34dbbd1834f8fd87caf49433f4d8518
-
SHA512
28878331760c134502de60577eb471ce2a29a5879d78a4ed718d1bbb3e818a562f91424ff4dc156603b28c00ae67cc3932803fee2c6c6d4987f75339eea88278
-
SSDEEP
12288:tbDqEkMs4q48IAeP0PifTEurPbvdqJplapLWTICNIYPKMTWN4t4OAUw91zRwIMfl:tXbs48LeP0P8E6dclWLi26KGOqMwIMN
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 202be69a05f98db6bf4f86ed7203607d.exe -
resource yara_rule behavioral1/memory/2224-0-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2224-31-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2224-32-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2224-33-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2224-34-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2224-35-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2224-36-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2224-37-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2224-38-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2224-39-0x0000000000400000-0x00000000005C7000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 202be69a05f98db6bf4f86ed7203607d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 202be69a05f98db6bf4f86ed7203607d.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main 202be69a05f98db6bf4f86ed7203607d.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2224 202be69a05f98db6bf4f86ed7203607d.exe 2224 202be69a05f98db6bf4f86ed7203607d.exe 2224 202be69a05f98db6bf4f86ed7203607d.exe 2224 202be69a05f98db6bf4f86ed7203607d.exe 2224 202be69a05f98db6bf4f86ed7203607d.exe 2224 202be69a05f98db6bf4f86ed7203607d.exe 2224 202be69a05f98db6bf4f86ed7203607d.exe 2224 202be69a05f98db6bf4f86ed7203607d.exe 2224 202be69a05f98db6bf4f86ed7203607d.exe 2224 202be69a05f98db6bf4f86ed7203607d.exe 2224 202be69a05f98db6bf4f86ed7203607d.exe 2224 202be69a05f98db6bf4f86ed7203607d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\202be69a05f98db6bf4f86ed7203607d.exe"C:\Users\Admin\AppData\Local\Temp\202be69a05f98db6bf4f86ed7203607d.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d