Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 14:03
Behavioral task
behavioral1
Sample
2405261f7308bf4365ae5b96c4e208ab.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2405261f7308bf4365ae5b96c4e208ab.exe
Resource
win10v2004-20231222-en
General
-
Target
2405261f7308bf4365ae5b96c4e208ab.exe
-
Size
236KB
-
MD5
2405261f7308bf4365ae5b96c4e208ab
-
SHA1
2b41672e4552f719939c7464ccc5c81f3d20bea2
-
SHA256
47bd68ea7c43931afdbcb84ace47674d81c0d1181368703701d91b2b4d385942
-
SHA512
06328be435bbce53f5e6b4ff025d57b8e2f3d3605c0d412d7af20176b4f5b06d406b5a5c951155abb82bcbdb9b68160652da3ca91f81652bdf3f98dff97deb6b
-
SSDEEP
6144:BH53M+AiZE8EJrKZzREeCy1cMBOtPOSnRo5RFpxK6:v9XEJrKEJMI1nRCpo6
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2768-0-0x0000000000CE0000-0x0000000000D70000-memory.dmp upx behavioral1/memory/2768-8-0x0000000000CE0000-0x0000000000D70000-memory.dmp upx behavioral1/memory/2768-41-0x0000000000CE0000-0x0000000000D70000-memory.dmp upx behavioral1/memory/2768-49-0x0000000000CE0000-0x0000000000D70000-memory.dmp upx behavioral1/memory/2768-51-0x0000000000CE0000-0x0000000000D70000-memory.dmp upx -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\o: 2405261f7308bf4365ae5b96c4e208ab.exe File opened (read-only) \??\q: 2405261f7308bf4365ae5b96c4e208ab.exe File opened (read-only) \??\s: 2405261f7308bf4365ae5b96c4e208ab.exe File opened (read-only) \??\u: 2405261f7308bf4365ae5b96c4e208ab.exe File opened (read-only) \??\x: 2405261f7308bf4365ae5b96c4e208ab.exe File opened (read-only) \??\i: 2405261f7308bf4365ae5b96c4e208ab.exe File opened (read-only) \??\j: 2405261f7308bf4365ae5b96c4e208ab.exe File opened (read-only) \??\p: 2405261f7308bf4365ae5b96c4e208ab.exe File opened (read-only) \??\v: 2405261f7308bf4365ae5b96c4e208ab.exe File opened (read-only) \??\w: 2405261f7308bf4365ae5b96c4e208ab.exe File opened (read-only) \??\g: 2405261f7308bf4365ae5b96c4e208ab.exe File opened (read-only) \??\h: 2405261f7308bf4365ae5b96c4e208ab.exe File opened (read-only) \??\t: 2405261f7308bf4365ae5b96c4e208ab.exe File opened (read-only) \??\z: 2405261f7308bf4365ae5b96c4e208ab.exe File opened (read-only) \??\y: 2405261f7308bf4365ae5b96c4e208ab.exe File opened (read-only) \??\e: 2405261f7308bf4365ae5b96c4e208ab.exe File opened (read-only) \??\k: 2405261f7308bf4365ae5b96c4e208ab.exe File opened (read-only) \??\l: 2405261f7308bf4365ae5b96c4e208ab.exe File opened (read-only) \??\m: 2405261f7308bf4365ae5b96c4e208ab.exe File opened (read-only) \??\n: 2405261f7308bf4365ae5b96c4e208ab.exe File opened (read-only) \??\r: 2405261f7308bf4365ae5b96c4e208ab.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 2405261f7308bf4365ae5b96c4e208ab.exe