Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 22:14
Static task
static1
Behavioral task
behavioral1
Sample
51c17f8ef5b9c82be5783894a1de46ef.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
51c17f8ef5b9c82be5783894a1de46ef.exe
Resource
win10v2004-20231215-en
General
-
Target
51c17f8ef5b9c82be5783894a1de46ef.exe
-
Size
258KB
-
MD5
51c17f8ef5b9c82be5783894a1de46ef
-
SHA1
138da3e48cd17245a4352d67d954b74b2e61e5c5
-
SHA256
1019912c10e48dac7387a512ab3390b11450f9b08d49a5ecc4c9128285aa3167
-
SHA512
5650b1f2aafd5be5138ef4aaa6b87fb6448fae085a93711a1576cd4d503191a07615a3fd5c3df65668ff2cb2c4c369560764cc6b6ddfcb162f4b925cd30b050e
-
SSDEEP
3072:LUwy3nA5CvMN1owIax49ENYBRX4kIPd5AEXk8SYXCXFqaw0FCtgKjKI0:4wyXAg0HFPin4v5AE0JQCnwrxjK9
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 51c17f8ef5b9c82be5783894a1de46ef.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 51c17f8ef5b9c82be5783894a1de46ef.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\LoudProof.job 51c17f8ef5b9c82be5783894a1de46ef.exe