Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 05:48
Behavioral task
behavioral1
Sample
45710bd31a13db93ff5f748c91973886.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
45710bd31a13db93ff5f748c91973886.exe
Resource
win10v2004-20231215-en
General
-
Target
45710bd31a13db93ff5f748c91973886.exe
-
Size
241KB
-
MD5
45710bd31a13db93ff5f748c91973886
-
SHA1
4cef73dfcab3a557ee85a4210a91c3c48f0c462e
-
SHA256
45fe03252b01b96498769f3f54c9f43ea96bf8c5b79c35ff4cd37af906bbfe34
-
SHA512
bd1af4b9d8504e84b4e2602b22d6674e82ce8dcb3228bcdfe13ea07d28140381b2e31de619cec82d980602935f0f1d5ddbe470c63591b93bbbd454836e695822
-
SSDEEP
6144:ikeENDvTSn2SV/GuhYdViC7X57+nMHPFRgPas:iNEND/k/GLPX57+nMF6Pas
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5080-0-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/5080-11-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/5080-12-0x0000000000400000-0x0000000000489000-memory.dmp upx -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\h: 45710bd31a13db93ff5f748c91973886.exe File opened (read-only) \??\k: 45710bd31a13db93ff5f748c91973886.exe File opened (read-only) \??\e: 45710bd31a13db93ff5f748c91973886.exe File opened (read-only) \??\i: 45710bd31a13db93ff5f748c91973886.exe File opened (read-only) \??\l: 45710bd31a13db93ff5f748c91973886.exe File opened (read-only) \??\m: 45710bd31a13db93ff5f748c91973886.exe File opened (read-only) \??\o: 45710bd31a13db93ff5f748c91973886.exe File opened (read-only) \??\u: 45710bd31a13db93ff5f748c91973886.exe File opened (read-only) \??\y: 45710bd31a13db93ff5f748c91973886.exe File opened (read-only) \??\g: 45710bd31a13db93ff5f748c91973886.exe File opened (read-only) \??\s: 45710bd31a13db93ff5f748c91973886.exe File opened (read-only) \??\v: 45710bd31a13db93ff5f748c91973886.exe File opened (read-only) \??\w: 45710bd31a13db93ff5f748c91973886.exe File opened (read-only) \??\p: 45710bd31a13db93ff5f748c91973886.exe File opened (read-only) \??\n: 45710bd31a13db93ff5f748c91973886.exe File opened (read-only) \??\q: 45710bd31a13db93ff5f748c91973886.exe File opened (read-only) \??\r: 45710bd31a13db93ff5f748c91973886.exe File opened (read-only) \??\t: 45710bd31a13db93ff5f748c91973886.exe File opened (read-only) \??\x: 45710bd31a13db93ff5f748c91973886.exe File opened (read-only) \??\z: 45710bd31a13db93ff5f748c91973886.exe File opened (read-only) \??\j: 45710bd31a13db93ff5f748c91973886.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 45710bd31a13db93ff5f748c91973886.exe