Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
197s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 13:45
Behavioral task
behavioral1
Sample
22c8d41dae8149be93a02adbafce4835.exe
Resource
win7-20231215-en
General
-
Target
22c8d41dae8149be93a02adbafce4835.exe
-
Size
679KB
-
MD5
22c8d41dae8149be93a02adbafce4835
-
SHA1
47b7ddfe6ed1609e2f668333794b422edf059516
-
SHA256
23808f7dfe64b16f25d30aef4162215eb9fc5a8e6ac8a12668509283f6b57717
-
SHA512
b1b98f3de4e680fe06a3787814c83d93efb0efe60bb9a375e1228349963af513cbfd59d064228c7f91318c85e4ada7104dcdbac4540bc2fadca644f33d6fe023
-
SSDEEP
12288:4Q+8YcSdcdp7GqDd7o4YINDz6/AAgYShiuFfIihBtwVabCMUA4+6vlF7h:0iSmrpDd75d68hiuF5H8abCMUN+YlFl
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 22c8d41dae8149be93a02adbafce4835.exe -
resource yara_rule behavioral1/memory/1040-0-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/1040-1-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/1040-20-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/1040-21-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/1040-27-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/1040-28-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/1040-29-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/1040-30-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/1040-31-0x0000000000400000-0x00000000005CC000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 22c8d41dae8149be93a02adbafce4835.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 22c8d41dae8149be93a02adbafce4835.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main 22c8d41dae8149be93a02adbafce4835.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1040 22c8d41dae8149be93a02adbafce4835.exe 1040 22c8d41dae8149be93a02adbafce4835.exe 1040 22c8d41dae8149be93a02adbafce4835.exe 1040 22c8d41dae8149be93a02adbafce4835.exe 1040 22c8d41dae8149be93a02adbafce4835.exe 1040 22c8d41dae8149be93a02adbafce4835.exe 1040 22c8d41dae8149be93a02adbafce4835.exe 1040 22c8d41dae8149be93a02adbafce4835.exe 1040 22c8d41dae8149be93a02adbafce4835.exe 1040 22c8d41dae8149be93a02adbafce4835.exe 1040 22c8d41dae8149be93a02adbafce4835.exe 1040 22c8d41dae8149be93a02adbafce4835.exe 1040 22c8d41dae8149be93a02adbafce4835.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\22c8d41dae8149be93a02adbafce4835.exe"C:\Users\Admin\AppData\Local\Temp\22c8d41dae8149be93a02adbafce4835.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1040