Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 11:06
Behavioral task
behavioral1
Sample
198c9cf0247c03b804ba224a22ceb07e.exe
Resource
win7-20231215-en
General
-
Target
198c9cf0247c03b804ba224a22ceb07e.exe
-
Size
679KB
-
MD5
198c9cf0247c03b804ba224a22ceb07e
-
SHA1
66f38099a66dca6d542d45e9d93c0e6bae3f464a
-
SHA256
046af6bff43e72f1c46e984112eebb829c39109b0ceed6911e18b35f849ae607
-
SHA512
9711efa3dfdaa5a5f8d2a528a97d2ff0cdc0bd558c24c267bbe125997bc9cf5d895064bb4a03c326cfec58b9564c84574ea81021fef1c85f15126d6d1790b953
-
SSDEEP
12288:SRO2Q8Iu71MZvr2ymO6l4S+obhFIVgFmO/oG3G+zQmS+Lrv7KXpQB9EzDk8BAZ01:Im88Kjh4SnbMKFmO/osPTS8v7KXpQBqd
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 198c9cf0247c03b804ba224a22ceb07e.exe -
resource yara_rule behavioral1/memory/2288-0-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2288-28-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2288-29-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2288-30-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2288-31-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2288-32-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2288-33-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2288-34-0x0000000000400000-0x00000000005CC000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 198c9cf0247c03b804ba224a22ceb07e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 198c9cf0247c03b804ba224a22ceb07e.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main 198c9cf0247c03b804ba224a22ceb07e.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2288 198c9cf0247c03b804ba224a22ceb07e.exe 2288 198c9cf0247c03b804ba224a22ceb07e.exe 2288 198c9cf0247c03b804ba224a22ceb07e.exe 2288 198c9cf0247c03b804ba224a22ceb07e.exe 2288 198c9cf0247c03b804ba224a22ceb07e.exe 2288 198c9cf0247c03b804ba224a22ceb07e.exe 2288 198c9cf0247c03b804ba224a22ceb07e.exe 2288 198c9cf0247c03b804ba224a22ceb07e.exe 2288 198c9cf0247c03b804ba224a22ceb07e.exe 2288 198c9cf0247c03b804ba224a22ceb07e.exe 2288 198c9cf0247c03b804ba224a22ceb07e.exe 2288 198c9cf0247c03b804ba224a22ceb07e.exe 2288 198c9cf0247c03b804ba224a22ceb07e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\198c9cf0247c03b804ba224a22ceb07e.exe"C:\Users\Admin\AppData\Local\Temp\198c9cf0247c03b804ba224a22ceb07e.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2288