Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
25s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
2a8c1077b3beb548de5ec634b14b9d37.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2a8c1077b3beb548de5ec634b14b9d37.exe
Resource
win10v2004-20231215-en
General
-
Target
2a8c1077b3beb548de5ec634b14b9d37.exe
-
Size
505KB
-
MD5
2a8c1077b3beb548de5ec634b14b9d37
-
SHA1
87f11b534ca35e712cc0b56bbab49af04fecf24d
-
SHA256
2aa67eccb4ae8f7bb8b5fd77c034a89601e7c605446471cd3a59852dc475a17b
-
SHA512
ea5b4be9a4b99c347b0aad9631805dd6e8e31f681118ca5a3c289f03e003e3d9d8f36a7f354f0b8d19ff7b72a0614e8911832dc583d2b5d0a1b8c776db2437d8
-
SSDEEP
6144:/Ti47MdDmnSGcE6m29sxma1HepqpYP75jJFpbASU9yblr2WJB+4Vk3:/TiFSSGcE6xKEzFpzvhrDxk3
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\y: 2a8c1077b3beb548de5ec634b14b9d37.exe File opened (read-only) \??\h: 2a8c1077b3beb548de5ec634b14b9d37.exe File opened (read-only) \??\j: 2a8c1077b3beb548de5ec634b14b9d37.exe File opened (read-only) \??\l: 2a8c1077b3beb548de5ec634b14b9d37.exe File opened (read-only) \??\o: 2a8c1077b3beb548de5ec634b14b9d37.exe File opened (read-only) \??\t: 2a8c1077b3beb548de5ec634b14b9d37.exe File opened (read-only) \??\u: 2a8c1077b3beb548de5ec634b14b9d37.exe File opened (read-only) \??\x: 2a8c1077b3beb548de5ec634b14b9d37.exe File opened (read-only) \??\z: 2a8c1077b3beb548de5ec634b14b9d37.exe File opened (read-only) \??\e: 2a8c1077b3beb548de5ec634b14b9d37.exe File opened (read-only) \??\i: 2a8c1077b3beb548de5ec634b14b9d37.exe File opened (read-only) \??\p: 2a8c1077b3beb548de5ec634b14b9d37.exe File opened (read-only) \??\q: 2a8c1077b3beb548de5ec634b14b9d37.exe File opened (read-only) \??\w: 2a8c1077b3beb548de5ec634b14b9d37.exe File opened (read-only) \??\s: 2a8c1077b3beb548de5ec634b14b9d37.exe File opened (read-only) \??\v: 2a8c1077b3beb548de5ec634b14b9d37.exe File opened (read-only) \??\g: 2a8c1077b3beb548de5ec634b14b9d37.exe File opened (read-only) \??\k: 2a8c1077b3beb548de5ec634b14b9d37.exe File opened (read-only) \??\m: 2a8c1077b3beb548de5ec634b14b9d37.exe File opened (read-only) \??\n: 2a8c1077b3beb548de5ec634b14b9d37.exe File opened (read-only) \??\r: 2a8c1077b3beb548de5ec634b14b9d37.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 2a8c1077b3beb548de5ec634b14b9d37.exe