Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 07:15
Behavioral task
behavioral1
Sample
11e3393a6c58acc727a616ec089565af.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11e3393a6c58acc727a616ec089565af.exe
Resource
win10v2004-20231215-en
General
-
Target
11e3393a6c58acc727a616ec089565af.exe
-
Size
666KB
-
MD5
11e3393a6c58acc727a616ec089565af
-
SHA1
650068a6f84527a8f6ce747e44da07a8e38f9a62
-
SHA256
735efc7f9b8e8af4258b10eaef7f34d26845bc747ac1f9cbb9ac3121d1758bbe
-
SHA512
54df280c04fdcb176c61a7eb3ce4a1c29f1d14ba5eea878e8f3e62aa93cd4fcd04d6edb2ebf85b3b3c914c1aea256888c92270ab144a85b1dec7deb31c24cd2e
-
SSDEEP
12288:CbDqEkMs4q48IAeP0PifTEurPbvdqJplapLWTICNIYPKMTWN4t4OAUw91zRwIMfQ:CXbs48LeP0P8E6dclWLi26KGOqMwIMY
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 11e3393a6c58acc727a616ec089565af.exe -
resource yara_rule behavioral1/memory/2184-0-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2184-19-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2184-20-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2184-21-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2184-22-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2184-23-0x0000000000400000-0x00000000005C7000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 11e3393a6c58acc727a616ec089565af.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 11e3393a6c58acc727a616ec089565af.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main 11e3393a6c58acc727a616ec089565af.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2184 11e3393a6c58acc727a616ec089565af.exe 2184 11e3393a6c58acc727a616ec089565af.exe 2184 11e3393a6c58acc727a616ec089565af.exe 2184 11e3393a6c58acc727a616ec089565af.exe 2184 11e3393a6c58acc727a616ec089565af.exe 2184 11e3393a6c58acc727a616ec089565af.exe 2184 11e3393a6c58acc727a616ec089565af.exe 2184 11e3393a6c58acc727a616ec089565af.exe 2184 11e3393a6c58acc727a616ec089565af.exe 2184 11e3393a6c58acc727a616ec089565af.exe 2184 11e3393a6c58acc727a616ec089565af.exe 2184 11e3393a6c58acc727a616ec089565af.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\11e3393a6c58acc727a616ec089565af.exe"C:\Users\Admin\AppData\Local\Temp\11e3393a6c58acc727a616ec089565af.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2184