Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
175s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 02:23
Static task
static1
Behavioral task
behavioral1
Sample
24611dfb733718a2fe6a502f06da07b2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
24611dfb733718a2fe6a502f06da07b2.exe
Resource
win10v2004-20231215-en
General
-
Target
24611dfb733718a2fe6a502f06da07b2.exe
-
Size
255KB
-
MD5
24611dfb733718a2fe6a502f06da07b2
-
SHA1
1c56eaf91a47c50dc49bef460f5fbeca562b3052
-
SHA256
04d664bdd3c5063cf04d2f14b30238878f8d00383cb9e0c25c8d5c57909284fc
-
SHA512
e4fb8a0f91f3c6608933889d890b7d2e60e0ac05858e7f7775dd2e3029bc502ebc8f598317fd9e2cbc1b6e151f553fa29c516662e3125e35a2236b11a20adc5f
-
SSDEEP
6144:B3ioA1Ws/pP0S9YJlFNLvgeGusoqHg4tq8Uie:By3/b9SFFSu2NUie
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 24611dfb733718a2fe6a502f06da07b2.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 24611dfb733718a2fe6a502f06da07b2.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\ExcellentNotes.job 24611dfb733718a2fe6a502f06da07b2.exe