Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 21:14
Behavioral task
behavioral1
Sample
3d0685eab2cc2f8919b9afa89eb9ba7f.exe
Resource
win7-20231215-en
General
-
Target
3d0685eab2cc2f8919b9afa89eb9ba7f.exe
-
Size
548KB
-
MD5
3d0685eab2cc2f8919b9afa89eb9ba7f
-
SHA1
7d534e6967224f42aac4e23df817ffad1f21fc15
-
SHA256
52c7acb089cb96caa1c1b9d3c925b17dbe01e175ecff0c0af046103fcbf664b5
-
SHA512
8a98204d92a124464f43963d1ae9f365b270eb0e80b15e74035636432af60b576e769d8af7af9daefecbba992d50cd21eda9099429df932a5d16afa40021f7f8
-
SSDEEP
12288:Al/NiIoYAbvZO7wNJgHO78VN4zN8EMDOVUjW3Xg8oSABBs:AZjoY4EEyHWqN6KjzbPs
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3d0685eab2cc2f8919b9afa89eb9ba7f.exe -
resource yara_rule behavioral2/memory/4080-0-0x0000000000B20000-0x0000000000D0E000-memory.dmp upx behavioral2/memory/4080-2-0x0000000000B20000-0x0000000000D0E000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 3d0685eab2cc2f8919b9afa89eb9ba7f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 3d0685eab2cc2f8919b9afa89eb9ba7f.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5076 4080 WerFault.exe 13 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4080 3d0685eab2cc2f8919b9afa89eb9ba7f.exe 4080 3d0685eab2cc2f8919b9afa89eb9ba7f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d0685eab2cc2f8919b9afa89eb9ba7f.exe"C:\Users\Admin\AppData\Local\Temp\3d0685eab2cc2f8919b9afa89eb9ba7f.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:4080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 20122⤵
- Program crash
PID:5076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4080 -ip 40801⤵PID:5036