Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 05:05
Static task
static1
Behavioral task
behavioral1
Sample
06be7eb15781ae8cf512981f66b592dc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
06be7eb15781ae8cf512981f66b592dc.exe
Resource
win10v2004-20231222-en
General
-
Target
06be7eb15781ae8cf512981f66b592dc.exe
-
Size
521KB
-
MD5
06be7eb15781ae8cf512981f66b592dc
-
SHA1
110e01b62ec885d7883e52f29cbc5f1b5aa6b74c
-
SHA256
24dc89d8858ae6c767d9c06e4755b6a1ef6230aa7328dce7a445e3bf0727917d
-
SHA512
50efe115e0712fb60921edb1cf05d66454f78884f3e9935c21accd3c95c604ff4a13c56b8138126aab86481d3be6be173d0b72a2afa3319746be9051077072aa
-
SSDEEP
12288:DL7GuyK/RFuWzlbyCCVUVrvet55WaVwzOFd2RnKLbNaQ/CX2xVkN:HXyidzJynUVc5YaiOGRKXNCuGN
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 06be7eb15781ae8cf512981f66b592dc.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 06be7eb15781ae8cf512981f66b592dc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 06be7eb15781ae8cf512981f66b592dc.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main 06be7eb15781ae8cf512981f66b592dc.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2396 06be7eb15781ae8cf512981f66b592dc.exe 2396 06be7eb15781ae8cf512981f66b592dc.exe 2396 06be7eb15781ae8cf512981f66b592dc.exe 2396 06be7eb15781ae8cf512981f66b592dc.exe 2396 06be7eb15781ae8cf512981f66b592dc.exe 2396 06be7eb15781ae8cf512981f66b592dc.exe 2396 06be7eb15781ae8cf512981f66b592dc.exe 2396 06be7eb15781ae8cf512981f66b592dc.exe 2396 06be7eb15781ae8cf512981f66b592dc.exe 2396 06be7eb15781ae8cf512981f66b592dc.exe 2396 06be7eb15781ae8cf512981f66b592dc.exe 2396 06be7eb15781ae8cf512981f66b592dc.exe 2396 06be7eb15781ae8cf512981f66b592dc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\06be7eb15781ae8cf512981f66b592dc.exe"C:\Users\Admin\AppData\Local\Temp\06be7eb15781ae8cf512981f66b592dc.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2396