Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
85s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 23:07
Behavioral task
behavioral1
Sample
1f72ab81bfa96a8f5b04ee84dec2c4aa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1f72ab81bfa96a8f5b04ee84dec2c4aa.exe
Resource
win10v2004-20231222-en
General
-
Target
1f72ab81bfa96a8f5b04ee84dec2c4aa.exe
-
Size
240KB
-
MD5
1f72ab81bfa96a8f5b04ee84dec2c4aa
-
SHA1
04e354140f03b0372072be4846ed29e766d42c54
-
SHA256
1c47c4ab7ad633c42e7fdec5e2033d968ff24f110854ff1d6f0c1d09df8fe39a
-
SHA512
7b98d7d87bd37e253961862ed0b5dd2c8b829e43adb6d5f1977401e17757fe09a99c26a9f39264de0d4a3b5e801e19b151d7bed4c23d6fc069906bc0173b8452
-
SSDEEP
6144:wK5lxWZmdARycX+x198PYyGghIjL7CSHu:/5bW+no0qPY1ghbGu
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4840-0-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/4840-11-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/4840-12-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/4840-13-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/4840-14-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/4840-17-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/4840-18-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/4840-20-0x0000000000400000-0x0000000000489000-memory.dmp upx -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\k: 1f72ab81bfa96a8f5b04ee84dec2c4aa.exe File opened (read-only) \??\l: 1f72ab81bfa96a8f5b04ee84dec2c4aa.exe File opened (read-only) \??\o: 1f72ab81bfa96a8f5b04ee84dec2c4aa.exe File opened (read-only) \??\q: 1f72ab81bfa96a8f5b04ee84dec2c4aa.exe File opened (read-only) \??\s: 1f72ab81bfa96a8f5b04ee84dec2c4aa.exe File opened (read-only) \??\z: 1f72ab81bfa96a8f5b04ee84dec2c4aa.exe File opened (read-only) \??\h: 1f72ab81bfa96a8f5b04ee84dec2c4aa.exe File opened (read-only) \??\i: 1f72ab81bfa96a8f5b04ee84dec2c4aa.exe File opened (read-only) \??\m: 1f72ab81bfa96a8f5b04ee84dec2c4aa.exe File opened (read-only) \??\n: 1f72ab81bfa96a8f5b04ee84dec2c4aa.exe File opened (read-only) \??\u: 1f72ab81bfa96a8f5b04ee84dec2c4aa.exe File opened (read-only) \??\y: 1f72ab81bfa96a8f5b04ee84dec2c4aa.exe File opened (read-only) \??\t: 1f72ab81bfa96a8f5b04ee84dec2c4aa.exe File opened (read-only) \??\v: 1f72ab81bfa96a8f5b04ee84dec2c4aa.exe File opened (read-only) \??\w: 1f72ab81bfa96a8f5b04ee84dec2c4aa.exe File opened (read-only) \??\e: 1f72ab81bfa96a8f5b04ee84dec2c4aa.exe File opened (read-only) \??\g: 1f72ab81bfa96a8f5b04ee84dec2c4aa.exe File opened (read-only) \??\j: 1f72ab81bfa96a8f5b04ee84dec2c4aa.exe File opened (read-only) \??\p: 1f72ab81bfa96a8f5b04ee84dec2c4aa.exe File opened (read-only) \??\r: 1f72ab81bfa96a8f5b04ee84dec2c4aa.exe File opened (read-only) \??\x: 1f72ab81bfa96a8f5b04ee84dec2c4aa.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 1f72ab81bfa96a8f5b04ee84dec2c4aa.exe