Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 18:09
Static task
static1
Behavioral task
behavioral1
Sample
3360f93f7e5718c5ea07d2946ebb6e6e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3360f93f7e5718c5ea07d2946ebb6e6e.exe
Resource
win10v2004-20231215-en
General
-
Target
3360f93f7e5718c5ea07d2946ebb6e6e.exe
-
Size
589KB
-
MD5
3360f93f7e5718c5ea07d2946ebb6e6e
-
SHA1
8e29447655af53219d82069731250bd4e0d744ad
-
SHA256
20b8edf7ceb574544b47b51f498b4572d3cb7e210b89761d1fbe8f63a6acbdbb
-
SHA512
023d1f7eeaa6e158ce6b2bab3d36e66fd58a5e587a0e5b8a6db0ec0f8774da46a2432b32dc35be5a768433ca1fb86d4ab92397f3eddcba62a029c7555eb7635d
-
SSDEEP
12288:54efV5INoSUUgDp8YROY1Rxi27DuSK8p6a70RxIza/eL8bW:5jINoSGp8kOYli27DFBIa70R3/eLs
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3360f93f7e5718c5ea07d2946ebb6e6e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 3360f93f7e5718c5ea07d2946ebb6e6e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 3360f93f7e5718c5ea07d2946ebb6e6e.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main 3360f93f7e5718c5ea07d2946ebb6e6e.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1820 3360f93f7e5718c5ea07d2946ebb6e6e.exe 1820 3360f93f7e5718c5ea07d2946ebb6e6e.exe 1820 3360f93f7e5718c5ea07d2946ebb6e6e.exe 1820 3360f93f7e5718c5ea07d2946ebb6e6e.exe 1820 3360f93f7e5718c5ea07d2946ebb6e6e.exe 1820 3360f93f7e5718c5ea07d2946ebb6e6e.exe 1820 3360f93f7e5718c5ea07d2946ebb6e6e.exe 1820 3360f93f7e5718c5ea07d2946ebb6e6e.exe 1820 3360f93f7e5718c5ea07d2946ebb6e6e.exe 1820 3360f93f7e5718c5ea07d2946ebb6e6e.exe 1820 3360f93f7e5718c5ea07d2946ebb6e6e.exe 1820 3360f93f7e5718c5ea07d2946ebb6e6e.exe 1820 3360f93f7e5718c5ea07d2946ebb6e6e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3360f93f7e5718c5ea07d2946ebb6e6e.exe"C:\Users\Admin\AppData\Local\Temp\3360f93f7e5718c5ea07d2946ebb6e6e.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1820