Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 05:07
Static task
static1
Behavioral task
behavioral1
Sample
06cef5b203f84d4964057729eb65df22.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
06cef5b203f84d4964057729eb65df22.exe
Resource
win10v2004-20231215-en
General
-
Target
06cef5b203f84d4964057729eb65df22.exe
-
Size
1.3MB
-
MD5
06cef5b203f84d4964057729eb65df22
-
SHA1
bc5ae6068a3330026850e1d499f460874d5e1485
-
SHA256
12cab74f91eabd1820fad59437c2e53245171097edb50959cb2e8f40d1575a87
-
SHA512
51cbb9327ac2a2023c22795b64c0fa3f8bdc8f1daf121ec054ab7294b596bdd45649ca2d0d615c23736be055e146090c611f64521e42128a1e936a6d03c5a511
-
SSDEEP
24576:jK6fxaOhc2dC3Rfzy41rWibAiCEydknBds0a0m1lK8q:m6JpC3RLy41aibAiCE1Ps0a1LKR
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 06cef5b203f84d4964057729eb65df22.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 06cef5b203f84d4964057729eb65df22.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 06cef5b203f84d4964057729eb65df22.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 06cef5b203f84d4964057729eb65df22.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4136 set thread context of 4604 4136 06cef5b203f84d4964057729eb65df22.exe 90 -
Program crash 2 IoCs
pid pid_target Process procid_target 1888 4604 WerFault.exe 90 2356 4604 WerFault.exe 90 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4604 06cef5b203f84d4964057729eb65df22.exe 4604 06cef5b203f84d4964057729eb65df22.exe 4604 06cef5b203f84d4964057729eb65df22.exe 4604 06cef5b203f84d4964057729eb65df22.exe 4604 06cef5b203f84d4964057729eb65df22.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4136 wrote to memory of 4604 4136 06cef5b203f84d4964057729eb65df22.exe 90 PID 4136 wrote to memory of 4604 4136 06cef5b203f84d4964057729eb65df22.exe 90 PID 4136 wrote to memory of 4604 4136 06cef5b203f84d4964057729eb65df22.exe 90 PID 4136 wrote to memory of 4604 4136 06cef5b203f84d4964057729eb65df22.exe 90 PID 4136 wrote to memory of 4604 4136 06cef5b203f84d4964057729eb65df22.exe 90 PID 4136 wrote to memory of 4604 4136 06cef5b203f84d4964057729eb65df22.exe 90 PID 4136 wrote to memory of 4604 4136 06cef5b203f84d4964057729eb65df22.exe 90 PID 4136 wrote to memory of 4604 4136 06cef5b203f84d4964057729eb65df22.exe 90 PID 4136 wrote to memory of 4604 4136 06cef5b203f84d4964057729eb65df22.exe 90 PID 4136 wrote to memory of 4604 4136 06cef5b203f84d4964057729eb65df22.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\06cef5b203f84d4964057729eb65df22.exe"C:\Users\Admin\AppData\Local\Temp\06cef5b203f84d4964057729eb65df22.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\06cef5b203f84d4964057729eb65df22.exe"C:\Users\Admin\AppData\Local\Temp\06cef5b203f84d4964057729eb65df22.exe" Track="0001001000"2⤵
- Suspicious use of SetWindowsHookEx
PID:4604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 20883⤵
- Program crash
PID:1888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 20243⤵
- Program crash
PID:2356
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4604 -ip 46041⤵PID:2788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4604 -ip 46041⤵PID:2540