Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 16:54
Static task
static1
Behavioral task
behavioral1
Sample
7e52ebea7cd6d638368666e70a51360d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7e52ebea7cd6d638368666e70a51360d.exe
Resource
win10v2004-20231215-en
General
-
Target
7e52ebea7cd6d638368666e70a51360d.exe
-
Size
580KB
-
MD5
7e52ebea7cd6d638368666e70a51360d
-
SHA1
ea0f01c13bef99f4d04b3b7300f195dc284724de
-
SHA256
140412c21be758d0c1126dc6024e2f594af4951c34efb09dae7e5f6a0195188c
-
SHA512
4547cc18aa202cfabd28de97101d7f688d027dee777fdd37712bc09d9d89f47e766fbb751faba68438a405cfeededa0e18b7e9757c0c575f7d679fc00e214e31
-
SSDEEP
12288:rPkZnNZwi3ZlYq/jVIO00rY/qMdb4GtcZy7HyLXz3v/Os3eSPclCR0:jKN+qlYKjVz00rYiMd8z3vmsuSPc0R0
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7e52ebea7cd6d638368666e70a51360d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 7e52ebea7cd6d638368666e70a51360d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 7e52ebea7cd6d638368666e70a51360d.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main 7e52ebea7cd6d638368666e70a51360d.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2360 7e52ebea7cd6d638368666e70a51360d.exe 2360 7e52ebea7cd6d638368666e70a51360d.exe 2360 7e52ebea7cd6d638368666e70a51360d.exe 2360 7e52ebea7cd6d638368666e70a51360d.exe 2360 7e52ebea7cd6d638368666e70a51360d.exe 2360 7e52ebea7cd6d638368666e70a51360d.exe 2360 7e52ebea7cd6d638368666e70a51360d.exe 2360 7e52ebea7cd6d638368666e70a51360d.exe 2360 7e52ebea7cd6d638368666e70a51360d.exe 2360 7e52ebea7cd6d638368666e70a51360d.exe 2360 7e52ebea7cd6d638368666e70a51360d.exe 2360 7e52ebea7cd6d638368666e70a51360d.exe 2360 7e52ebea7cd6d638368666e70a51360d.exe 2360 7e52ebea7cd6d638368666e70a51360d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e52ebea7cd6d638368666e70a51360d.exe"C:\Users\Admin\AppData\Local\Temp\7e52ebea7cd6d638368666e70a51360d.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06