Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 19:56
Behavioral task
behavioral1
Sample
399e4c840bab8deb8941077f9cc45039.exe
Resource
win7-20231215-en
General
-
Target
399e4c840bab8deb8941077f9cc45039.exe
-
Size
679KB
-
MD5
399e4c840bab8deb8941077f9cc45039
-
SHA1
be146f137f1dd688313fb96f2e448d035078742a
-
SHA256
16084866a25e9bccc4de731b2e4dcfffcbccb0b183a48afc6672e2fc804204c2
-
SHA512
ed74a18ecb687fc37dad9f90f63c91e36618876a6c5a27bead8f55ec70495c8b5a036964ebac56dfd2549b6474f2173de9e13c7af740e49b571ad24468432de7
-
SSDEEP
12288:4Q+8YcSdcdp7GqDd7o4YINDz6/AAgYShiuFfIihBtwVabCMUA4+6vlF7E:0iSmrpDd75d68hiuF5H8abCMUN+YlFA
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 399e4c840bab8deb8941077f9cc45039.exe -
resource yara_rule behavioral1/memory/2432-0-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2432-28-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2432-29-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2432-30-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2432-31-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2432-32-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2432-33-0x0000000000400000-0x00000000005CC000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 399e4c840bab8deb8941077f9cc45039.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 399e4c840bab8deb8941077f9cc45039.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main 399e4c840bab8deb8941077f9cc45039.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2432 399e4c840bab8deb8941077f9cc45039.exe 2432 399e4c840bab8deb8941077f9cc45039.exe 2432 399e4c840bab8deb8941077f9cc45039.exe 2432 399e4c840bab8deb8941077f9cc45039.exe 2432 399e4c840bab8deb8941077f9cc45039.exe 2432 399e4c840bab8deb8941077f9cc45039.exe 2432 399e4c840bab8deb8941077f9cc45039.exe 2432 399e4c840bab8deb8941077f9cc45039.exe 2432 399e4c840bab8deb8941077f9cc45039.exe 2432 399e4c840bab8deb8941077f9cc45039.exe 2432 399e4c840bab8deb8941077f9cc45039.exe 2432 399e4c840bab8deb8941077f9cc45039.exe 2432 399e4c840bab8deb8941077f9cc45039.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\399e4c840bab8deb8941077f9cc45039.exe"C:\Users\Admin\AppData\Local\Temp\399e4c840bab8deb8941077f9cc45039.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432