Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 00:31
Behavioral task
behavioral1
Sample
21cb8a48c8e5a4fe6a72f5b099284365.exe
Resource
win7-20231215-en
General
-
Target
21cb8a48c8e5a4fe6a72f5b099284365.exe
-
Size
663KB
-
MD5
21cb8a48c8e5a4fe6a72f5b099284365
-
SHA1
8bf63c57caf25a21ccc1c413af4a5c986d74e2eb
-
SHA256
5c72b8c27355eacb7aca44b1dec23d2821433c641305b0c1b2fd4d504d46175c
-
SHA512
761dde94826c6a75717314440fc27d0dc84df9df85c4783badf8d3ea8b82af1d28c3af297aa470bd6052089034f9bafd588f6f286013ca18c3d723ba68ef2bf0
-
SSDEEP
12288:ybDqEkMs4q48IAeP0PifTEurPbvdqJplapLWTICNIYPKMTWN4t4OAUw91zRwIMft:yXbs48LeP0P8E6dclWLi26KGOqMwIMl
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 21cb8a48c8e5a4fe6a72f5b099284365.exe -
resource yara_rule behavioral1/memory/2356-0-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2356-19-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2356-20-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2356-21-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2356-22-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2356-23-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2356-24-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2356-25-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2356-26-0x0000000000400000-0x00000000005C7000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 21cb8a48c8e5a4fe6a72f5b099284365.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 21cb8a48c8e5a4fe6a72f5b099284365.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main 21cb8a48c8e5a4fe6a72f5b099284365.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2356 21cb8a48c8e5a4fe6a72f5b099284365.exe 2356 21cb8a48c8e5a4fe6a72f5b099284365.exe 2356 21cb8a48c8e5a4fe6a72f5b099284365.exe 2356 21cb8a48c8e5a4fe6a72f5b099284365.exe 2356 21cb8a48c8e5a4fe6a72f5b099284365.exe 2356 21cb8a48c8e5a4fe6a72f5b099284365.exe 2356 21cb8a48c8e5a4fe6a72f5b099284365.exe 2356 21cb8a48c8e5a4fe6a72f5b099284365.exe 2356 21cb8a48c8e5a4fe6a72f5b099284365.exe 2356 21cb8a48c8e5a4fe6a72f5b099284365.exe 2356 21cb8a48c8e5a4fe6a72f5b099284365.exe 2356 21cb8a48c8e5a4fe6a72f5b099284365.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21cb8a48c8e5a4fe6a72f5b099284365.exe"C:\Users\Admin\AppData\Local\Temp\21cb8a48c8e5a4fe6a72f5b099284365.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2356