Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 13:33
Static task
static1
Behavioral task
behavioral1
Sample
220fa8991467de6129771c7b647373d4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
220fa8991467de6129771c7b647373d4.exe
Resource
win10v2004-20231215-en
General
-
Target
220fa8991467de6129771c7b647373d4.exe
-
Size
586KB
-
MD5
220fa8991467de6129771c7b647373d4
-
SHA1
0b1d7dbef85aab6bdd259263e7be7e1a7c3a21de
-
SHA256
238d9471875b776d44e9fe3b0ee132984309cb6cd2d38897fa3f5edfcc3f7c6d
-
SHA512
4ad8a0e716d5d3f273a8883324d211e47846b1fe075d599813399caff1ef084e5c39433eeb27430e1209387167fb6641e3391e5101abb36ac0f0e30955baf066
-
SSDEEP
12288:u4efV5INoSUUgDp8YROY1Rxi27DuSK8p6a70RxIza/eL8bWo:ujINoSGp8kOYli27DFBIa70R3/eLsx
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 220fa8991467de6129771c7b647373d4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 220fa8991467de6129771c7b647373d4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 220fa8991467de6129771c7b647373d4.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main 220fa8991467de6129771c7b647373d4.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1032 220fa8991467de6129771c7b647373d4.exe 1032 220fa8991467de6129771c7b647373d4.exe 1032 220fa8991467de6129771c7b647373d4.exe 1032 220fa8991467de6129771c7b647373d4.exe 1032 220fa8991467de6129771c7b647373d4.exe 1032 220fa8991467de6129771c7b647373d4.exe 1032 220fa8991467de6129771c7b647373d4.exe 1032 220fa8991467de6129771c7b647373d4.exe 1032 220fa8991467de6129771c7b647373d4.exe 1032 220fa8991467de6129771c7b647373d4.exe 1032 220fa8991467de6129771c7b647373d4.exe 1032 220fa8991467de6129771c7b647373d4.exe 1032 220fa8991467de6129771c7b647373d4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\220fa8991467de6129771c7b647373d4.exe"C:\Users\Admin\AppData\Local\Temp\220fa8991467de6129771c7b647373d4.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1032