Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 17:19
Static task
static1
Behavioral task
behavioral1
Sample
77efbb0ae28325ae8765c2e00f79566f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
77efbb0ae28325ae8765c2e00f79566f.exe
Resource
win10v2004-20231222-en
General
-
Target
77efbb0ae28325ae8765c2e00f79566f.exe
-
Size
1.2MB
-
MD5
77efbb0ae28325ae8765c2e00f79566f
-
SHA1
9db3f690278e5f1df87314c5e02147e87599f200
-
SHA256
2227d9ea56b3af66b980be46d582547c43acdde9670874bea48c374b7afc4078
-
SHA512
4a3363c4e2c0dec0f2eb368386adbe29c4a41b0866bcffd14643342555f4a9bced7e6bc874b5febd4ed4e26a3d62ff29f2cefcf2265cb1c462bbc550314e2233
-
SSDEEP
24576:pAbMSe0NArZRTldLRxpyg9fKPlU0Lw62uT+x1fWp2vI:pONerTtvLMw62THI
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 77efbb0ae28325ae8765c2e00f79566f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 77efbb0ae28325ae8765c2e00f79566f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 77efbb0ae28325ae8765c2e00f79566f.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2288 set thread context of 320 2288 77efbb0ae28325ae8765c2e00f79566f.exe 85 -
Program crash 2 IoCs
pid pid_target Process procid_target 3508 320 WerFault.exe 85 2720 320 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 320 77efbb0ae28325ae8765c2e00f79566f.exe 320 77efbb0ae28325ae8765c2e00f79566f.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 320 77efbb0ae28325ae8765c2e00f79566f.exe 320 77efbb0ae28325ae8765c2e00f79566f.exe 320 77efbb0ae28325ae8765c2e00f79566f.exe 320 77efbb0ae28325ae8765c2e00f79566f.exe 320 77efbb0ae28325ae8765c2e00f79566f.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2288 wrote to memory of 320 2288 77efbb0ae28325ae8765c2e00f79566f.exe 85 PID 2288 wrote to memory of 320 2288 77efbb0ae28325ae8765c2e00f79566f.exe 85 PID 2288 wrote to memory of 320 2288 77efbb0ae28325ae8765c2e00f79566f.exe 85 PID 2288 wrote to memory of 320 2288 77efbb0ae28325ae8765c2e00f79566f.exe 85 PID 2288 wrote to memory of 320 2288 77efbb0ae28325ae8765c2e00f79566f.exe 85 PID 2288 wrote to memory of 320 2288 77efbb0ae28325ae8765c2e00f79566f.exe 85 PID 2288 wrote to memory of 320 2288 77efbb0ae28325ae8765c2e00f79566f.exe 85 PID 2288 wrote to memory of 320 2288 77efbb0ae28325ae8765c2e00f79566f.exe 85 PID 2288 wrote to memory of 320 2288 77efbb0ae28325ae8765c2e00f79566f.exe 85 PID 2288 wrote to memory of 320 2288 77efbb0ae28325ae8765c2e00f79566f.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\77efbb0ae28325ae8765c2e00f79566f.exe"C:\Users\Admin\AppData\Local\Temp\77efbb0ae28325ae8765c2e00f79566f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\77efbb0ae28325ae8765c2e00f79566f.exe"C:\Users\Admin\AppData\Local\Temp\77efbb0ae28325ae8765c2e00f79566f.exe" Track=""2⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 320 -s 20323⤵
- Program crash
PID:3508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 320 -s 19723⤵
- Program crash
PID:2720
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 320 -ip 3201⤵PID:4872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 320 -ip 3201⤵PID:4640