Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 04:22
Behavioral task
behavioral1
Sample
53bd5afec2ad0b6ab5c396d1008c23ed.exe
Resource
win7-20231215-en
General
-
Target
53bd5afec2ad0b6ab5c396d1008c23ed.exe
-
Size
679KB
-
MD5
53bd5afec2ad0b6ab5c396d1008c23ed
-
SHA1
c513812652b34afd1009e25c9b84420393c2b055
-
SHA256
150d43b4959347509958bca7bdcb94bc6b716af6c6d3cdd7ff667d878f9ab079
-
SHA512
54eadad5685aa6cd6658b85128fbb632292393bd75568b07129dc93c0af060350dec82761f96ad23343f6cbf3cf922776725684d6e4d5852bbe51dea94ab256c
-
SSDEEP
12288:oQ+8YcSdcdp7GqDd7o4YINDz6/AAgYShiuFfIihBtwVabCMUA4+6vlF7J:kiSmrpDd75d68hiuF5H8abCMUN+YlFV
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 53bd5afec2ad0b6ab5c396d1008c23ed.exe -
resource yara_rule behavioral1/memory/1876-0-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/1876-22-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/1876-23-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/1876-24-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/1876-25-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/1876-26-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/1876-27-0x0000000000400000-0x00000000005CC000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 53bd5afec2ad0b6ab5c396d1008c23ed.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 53bd5afec2ad0b6ab5c396d1008c23ed.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main 53bd5afec2ad0b6ab5c396d1008c23ed.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1876 53bd5afec2ad0b6ab5c396d1008c23ed.exe 1876 53bd5afec2ad0b6ab5c396d1008c23ed.exe 1876 53bd5afec2ad0b6ab5c396d1008c23ed.exe 1876 53bd5afec2ad0b6ab5c396d1008c23ed.exe 1876 53bd5afec2ad0b6ab5c396d1008c23ed.exe 1876 53bd5afec2ad0b6ab5c396d1008c23ed.exe 1876 53bd5afec2ad0b6ab5c396d1008c23ed.exe 1876 53bd5afec2ad0b6ab5c396d1008c23ed.exe 1876 53bd5afec2ad0b6ab5c396d1008c23ed.exe 1876 53bd5afec2ad0b6ab5c396d1008c23ed.exe 1876 53bd5afec2ad0b6ab5c396d1008c23ed.exe 1876 53bd5afec2ad0b6ab5c396d1008c23ed.exe 1876 53bd5afec2ad0b6ab5c396d1008c23ed.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\53bd5afec2ad0b6ab5c396d1008c23ed.exe"C:\Users\Admin\AppData\Local\Temp\53bd5afec2ad0b6ab5c396d1008c23ed.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1876