Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 08:31
Static task
static1
Behavioral task
behavioral1
Sample
5ffcd90e30a903c9bc27fad8390325d3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5ffcd90e30a903c9bc27fad8390325d3.exe
Resource
win10v2004-20231222-en
General
-
Target
5ffcd90e30a903c9bc27fad8390325d3.exe
-
Size
893KB
-
MD5
5ffcd90e30a903c9bc27fad8390325d3
-
SHA1
ef10c916ea63fb3dd09c974954f7486e652c0c46
-
SHA256
43739b58b7db0849592610c7d29404ca0b4e7358af258df643f698270a3e8997
-
SHA512
fa1af37753df49e472def448efcfed63e32b5266442c0d0743488a747583e5e356bb9d2ade76ec4767be4d159e9e6d8f4d972b467b29837bc1e8c5a149919e32
-
SSDEEP
24576:9YY2DlN2D32DCiF60bSQVXRtsY9lcnCxeggEZh:WRkaedQVXXsLCx5fh
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 5ffcd90e30a903c9bc27fad8390325d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5ffcd90e30a903c9bc27fad8390325d3.exe -
resource yara_rule behavioral1/memory/2644-1-0x0000000000390000-0x00000000003A1000-memory.dmp upx behavioral1/memory/2644-4-0x0000000000390000-0x00000000003A1000-memory.dmp upx behavioral1/memory/2644-6-0x00000000003B0000-0x00000000003E8000-memory.dmp upx behavioral1/memory/2644-5-0x00000000003B0000-0x00000000003E8000-memory.dmp upx behavioral1/memory/2644-3-0x0000000000390000-0x00000000003A1000-memory.dmp upx behavioral1/memory/2644-2-0x0000000000390000-0x00000000003A1000-memory.dmp upx behavioral1/memory/2644-17-0x0000000000390000-0x00000000003A1000-memory.dmp upx behavioral1/memory/2644-18-0x00000000003B0000-0x00000000003E8000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2644 set thread context of 2780 2644 5ffcd90e30a903c9bc27fad8390325d3.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2668 2644 WerFault.exe 16 -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5ffcd90e30a903c9bc27fad8390325d3.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5ffcd90e30a903c9bc27fad8390325d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 5ffcd90e30a903c9bc27fad8390325d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5ffcd90e30a903c9bc27fad8390325d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 5ffcd90e30a903c9bc27fad8390325d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet 5ffcd90e30a903c9bc27fad8390325d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform ID 5ffcd90e30a903c9bc27fad8390325d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5ffcd90e30a903c9bc27fad8390325d3.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 5ffcd90e30a903c9bc27fad8390325d3.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2644 5ffcd90e30a903c9bc27fad8390325d3.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2760 2644 5ffcd90e30a903c9bc27fad8390325d3.exe 31 PID 2644 wrote to memory of 2760 2644 5ffcd90e30a903c9bc27fad8390325d3.exe 31 PID 2644 wrote to memory of 2760 2644 5ffcd90e30a903c9bc27fad8390325d3.exe 31 PID 2644 wrote to memory of 2760 2644 5ffcd90e30a903c9bc27fad8390325d3.exe 31 PID 2644 wrote to memory of 2760 2644 5ffcd90e30a903c9bc27fad8390325d3.exe 31 PID 2644 wrote to memory of 2760 2644 5ffcd90e30a903c9bc27fad8390325d3.exe 31 PID 2644 wrote to memory of 2760 2644 5ffcd90e30a903c9bc27fad8390325d3.exe 31 PID 2644 wrote to memory of 2776 2644 5ffcd90e30a903c9bc27fad8390325d3.exe 30 PID 2644 wrote to memory of 2776 2644 5ffcd90e30a903c9bc27fad8390325d3.exe 30 PID 2644 wrote to memory of 2776 2644 5ffcd90e30a903c9bc27fad8390325d3.exe 30 PID 2644 wrote to memory of 2776 2644 5ffcd90e30a903c9bc27fad8390325d3.exe 30 PID 2644 wrote to memory of 2776 2644 5ffcd90e30a903c9bc27fad8390325d3.exe 30 PID 2644 wrote to memory of 2776 2644 5ffcd90e30a903c9bc27fad8390325d3.exe 30 PID 2644 wrote to memory of 2776 2644 5ffcd90e30a903c9bc27fad8390325d3.exe 30 PID 2644 wrote to memory of 2780 2644 5ffcd90e30a903c9bc27fad8390325d3.exe 28 PID 2644 wrote to memory of 2780 2644 5ffcd90e30a903c9bc27fad8390325d3.exe 28 PID 2644 wrote to memory of 2780 2644 5ffcd90e30a903c9bc27fad8390325d3.exe 28 PID 2644 wrote to memory of 2780 2644 5ffcd90e30a903c9bc27fad8390325d3.exe 28 PID 2644 wrote to memory of 2780 2644 5ffcd90e30a903c9bc27fad8390325d3.exe 28 PID 2644 wrote to memory of 2668 2644 5ffcd90e30a903c9bc27fad8390325d3.exe 29 PID 2644 wrote to memory of 2668 2644 5ffcd90e30a903c9bc27fad8390325d3.exe 29 PID 2644 wrote to memory of 2668 2644 5ffcd90e30a903c9bc27fad8390325d3.exe 29 PID 2644 wrote to memory of 2668 2644 5ffcd90e30a903c9bc27fad8390325d3.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ffcd90e30a903c9bc27fad8390325d3.exe"C:\Users\Admin\AppData\Local\Temp\5ffcd90e30a903c9bc27fad8390325d3.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\5ffcd90e30a903c9bc27fad8390325d3.exeC:\Users\Admin\AppData\Local\Temp\5ffcd90e30a903c9bc27fad8390325d3.exe2⤵PID:2780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 3522⤵
- Program crash
PID:2668
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2776
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2760
-