Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
52s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 05:46
Static task
static1
Behavioral task
behavioral1
Sample
1055800e383ab5a9d889859c88acd975.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1055800e383ab5a9d889859c88acd975.exe
Resource
win10v2004-20231215-en
General
-
Target
1055800e383ab5a9d889859c88acd975.exe
-
Size
548KB
-
MD5
1055800e383ab5a9d889859c88acd975
-
SHA1
30afc638805cbc08189887c07736b374631e3145
-
SHA256
e18c47ee417c27f86193d662d88b7e6a61026c30e965cad0aa1000827160df5a
-
SHA512
a8f97d44aaa88eaa67d40ecdec16cea2579e3d5f20a14a716b9313352b351e6ab53f7c056aa49c310ace4c3886b78cdbbf9fd51f4b080a6b3f10555dfd2dfcaa
-
SSDEEP
6144:VJLtlgLipkFYLV+1JHBF99geFDr6Oh5nW1h0p0tqJuxrGAj+nPbZXtK:rLzkFYLVo93FDrxn+B8JusAjiQ
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1055800e383ab5a9d889859c88acd975.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 1055800e383ab5a9d889859c88acd975.exe -
Modifies registry class 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D19BD7F7-F482-5226-8A9F-F28F29E0812C}\InprocServer32\ = "C:\\Windows\\SysWOW64\\FirewallAPI.dll" 1055800e383ab5a9d889859c88acd975.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D19BD7F7-F482-5226-8A9F-F28F29E0812C}\ProgID 1055800e383ab5a9d889859c88acd975.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D19BD7F7-F482-5226-8A9F-F28F29E0812C}\ = "HNetCfg.FwOpenPort" 1055800e383ab5a9d889859c88acd975.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D19BD7F7-F482-5226-8A9F-F28F29E0812C}\AppID = "{0CA545C6-37AD-4A6C-BF92-9F7610067EF5}" 1055800e383ab5a9d889859c88acd975.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D19BD7F7-F482-5226-8A9F-F28F29E0812C}\LocalizedString = "@C:\\Windows\\SysWOW64\\FirewallControlPanel.dll,-12122" 1055800e383ab5a9d889859c88acd975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D19BD7F7-F482-5226-8A9F-F28F29E0812C}\Elevation\Enabled = "1" 1055800e383ab5a9d889859c88acd975.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D19BD7F7-F482-5226-8A9F-F28F29E0812C}\Elevation\IconReference = "@C:\\Windows\\SysWOW64\\FirewallControlPanel.dll,-1" 1055800e383ab5a9d889859c88acd975.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D19BD7F7-F482-5226-8A9F-F28F29E0812C}\InprocServer32 1055800e383ab5a9d889859c88acd975.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D19BD7F7-F482-5226-8A9F-F28F29E0812C} 1055800e383ab5a9d889859c88acd975.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D19BD7F7-F482-5226-8A9F-F28F29E0812C}\Elevation 1055800e383ab5a9d889859c88acd975.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D19BD7F7-F482-5226-8A9F-F28F29E0812C}\InprocServer32\ThreadingModel = "Both" 1055800e383ab5a9d889859c88acd975.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D19BD7F7-F482-5226-8A9F-F28F29E0812C}\ProgID\ = "HNetCfg.FwOpenPort" 1055800e383ab5a9d889859c88acd975.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2616 1055800e383ab5a9d889859c88acd975.exe Token: SeIncBasePriorityPrivilege 2616 1055800e383ab5a9d889859c88acd975.exe