Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
4s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 14:43
Static task
static1
Behavioral task
behavioral1
Sample
76729bdc81b2f53f91101e607a21ba13.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
76729bdc81b2f53f91101e607a21ba13.exe
Resource
win10v2004-20231215-en
General
-
Target
76729bdc81b2f53f91101e607a21ba13.exe
-
Size
229KB
-
MD5
76729bdc81b2f53f91101e607a21ba13
-
SHA1
1518a5b5e536af83cccacae98de4ede65dca9769
-
SHA256
376b86e795ac22f7c439a3fbb6e2560149942b684a0f883830b60e679643741c
-
SHA512
9230b594b0515a25a0eea1e3e3945c3d5433414beebfff32f5f974e7bf65789650105a63fd3f530a9a21a812a976508c988af26199e7534a1576d2dec79c0b0d
-
SSDEEP
6144:XD55IvaE8HE4eWMtKKi6r0AByEV1q6tf5I:Xp9/T6r0AzTdf
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Fwixrggeh = "C:\\Windows\\SysWOW64\\dsreg3.exe" 76729bdc81b2f53f91101e607a21ba13.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 76729bdc81b2f53f91101e607a21ba13.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 76729bdc81b2f53f91101e607a21ba13.exe -
Executes dropped EXE 1 IoCs
pid Process 5028 dsreg3.exe -
resource yara_rule behavioral2/memory/1464-4-0x0000000000510000-0x00000000005A0000-memory.dmp upx behavioral2/memory/1464-7-0x0000000000510000-0x00000000005A0000-memory.dmp upx behavioral2/memory/1464-6-0x0000000000510000-0x00000000005A0000-memory.dmp upx behavioral2/memory/1464-5-0x0000000000510000-0x00000000005A0000-memory.dmp upx behavioral2/memory/1464-1-0x0000000000510000-0x00000000005A0000-memory.dmp upx behavioral2/memory/1464-20-0x0000000000510000-0x00000000005A0000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 76729bdc81b2f53f91101e607a21ba13.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dsreg3.exe 76729bdc81b2f53f91101e607a21ba13.exe File opened for modification C:\Windows\SysWOW64\dsreg3.exe 76729bdc81b2f53f91101e607a21ba13.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2208 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1464 76729bdc81b2f53f91101e607a21ba13.exe 1464 76729bdc81b2f53f91101e607a21ba13.exe 1464 76729bdc81b2f53f91101e607a21ba13.exe 1464 76729bdc81b2f53f91101e607a21ba13.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1464 76729bdc81b2f53f91101e607a21ba13.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1464 wrote to memory of 5028 1464 76729bdc81b2f53f91101e607a21ba13.exe 99 PID 1464 wrote to memory of 5028 1464 76729bdc81b2f53f91101e607a21ba13.exe 99 PID 1464 wrote to memory of 5028 1464 76729bdc81b2f53f91101e607a21ba13.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\76729bdc81b2f53f91101e607a21ba13.exe"C:\Users\Admin\AppData\Local\Temp\76729bdc81b2f53f91101e607a21ba13.exe"1⤵
- Adds policy Run key to start application
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\cmd.exe/c C:\Users\Admin\AppData\Local\Temp\~unins7546.bat "C:\Users\Admin\AppData\Local\Temp\76729bdc81b2f53f91101e607a21ba13.exe"2⤵PID:3252
-
-
C:\Windows\SysWOW64\dsreg3.exeC:\Windows\SysWOW64\dsreg3.exe2⤵
- Executes dropped EXE
PID:5028
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /flushdns1⤵
- Gathers network information
PID:2208