Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
104s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 05:48
Static task
static1
Behavioral task
behavioral1
Sample
66dab2f3624055189f038b2c4bedd386.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
66dab2f3624055189f038b2c4bedd386.exe
Resource
win10v2004-20231215-en
General
-
Target
66dab2f3624055189f038b2c4bedd386.exe
-
Size
259KB
-
MD5
66dab2f3624055189f038b2c4bedd386
-
SHA1
1d666311468be4b00097024846f808c4d4ba2ab3
-
SHA256
21c4b77b512e87f39de6ec80ed6d83300ed25ae64f711491c1f6e24647454458
-
SHA512
6483f269d56cfa902832b8e3b59ab7a99ef8e7014541aa8eac728f0b2480962af04d865bb0ad7e5b382a1241081bd76368d9d47b1f67d6cae98d46e79ec4cfa5
-
SSDEEP
6144:s3Ia3IcTyLwKao6WmDu8vYYIuLMnDaLl5Qr2L0lSx/W:iTIjao6x5onuLl+rq0le/W
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 66dab2f3624055189f038b2c4bedd386.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 66dab2f3624055189f038b2c4bedd386.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\PasswordChain.job 66dab2f3624055189f038b2c4bedd386.exe