Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 12:26
Behavioral task
behavioral1
Sample
1e4280c4bc3bcbdff348a058b0ba8f6a.exe
Resource
win7-20231215-en
General
-
Target
1e4280c4bc3bcbdff348a058b0ba8f6a.exe
-
Size
76KB
-
MD5
1e4280c4bc3bcbdff348a058b0ba8f6a
-
SHA1
e1d1ed450d3067694d72f792069793ecb4f87182
-
SHA256
65da90980f04143094809ccff3d1d09e473c758d817be69cfc91955e41579aaa
-
SHA512
ec68c262e02af08bf4ea8723f57778b8af2a96b2d9e94686b2d8492ec734a273602c74e732deebf251fedeb791b23c973bb8d7fb91ce1b56f0a91ae9af8c5839
-
SSDEEP
768:FJxSACC85zFZSUkK8YW4oDXnAKkXuToLCkUM76or7lf7GIY:DxSASaz54FKkXuTocM76t5
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 1e4280c4bc3bcbdff348a058b0ba8f6a.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 1e4280c4bc3bcbdff348a058b0ba8f6a.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 1e4280c4bc3bcbdff348a058b0ba8f6a.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\1e4280c4bc3bcbdff348a058b0ba8f6a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1e4280c4bc3bcbdff348a058b0ba8f6a.exe:*:Enabled:ldrsoft" 1e4280c4bc3bcbdff348a058b0ba8f6a.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1e4280c4bc3bcbdff348a058b0ba8f6a.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4856-0-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral2/memory/4856-2-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral2/memory/4856-5-0x0000000000400000-0x0000000000413000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4856 wrote to memory of 4040 4856 1e4280c4bc3bcbdff348a058b0ba8f6a.exe 106 PID 4856 wrote to memory of 4040 4856 1e4280c4bc3bcbdff348a058b0ba8f6a.exe 106 PID 4856 wrote to memory of 4040 4856 1e4280c4bc3bcbdff348a058b0ba8f6a.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e4280c4bc3bcbdff348a058b0ba8f6a.exe"C:\Users\Admin\AppData\Local\Temp\1e4280c4bc3bcbdff348a058b0ba8f6a.exe"1⤵
- Modifies firewall policy service
- Checks BIOS information in registry
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\1E4280~1.EXE00.bat2⤵PID:4040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5b20b2d00fae8eecc18cc07dcd38a7da2
SHA1ce8ceea1f7ef42c39e966923434146fe4b2d2232
SHA256730111e3fd8de747f60965423bfa236702cb0d12e5c5f7cd8600e21c9efea863
SHA5128c117ed9679432e72e80ab38a4de15736151c72f3239fdc03c0c84345f56902606412b2ac906f39a4a4e63bd1c305b11fe565d39096f773f17a754553d8fefa1