Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/02/2024, 11:30
Static task
static1
Behavioral task
behavioral1
Sample
86c9166dcde65a227fef3e47f5da6455.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
86c9166dcde65a227fef3e47f5da6455.exe
Resource
win10v2004-20231215-en
General
-
Target
86c9166dcde65a227fef3e47f5da6455.exe
-
Size
38KB
-
MD5
86c9166dcde65a227fef3e47f5da6455
-
SHA1
d8af07be04f0178c825c10e46925c370d81ffa5c
-
SHA256
8d1acbee7dd47792bb564205548ff8f6b7293eef562358413690a1b3363bb889
-
SHA512
ba8db33918abab0af0b2a8e1a8bcd66d5542bbe87fd1863d6055da9902519737804e40761180ef87e1fb8bd892f6e022b0b927c88f0ba1c3244526495bb40467
-
SSDEEP
768:L2YEdlz5Fk2reUdkvB6xuE/6OJzifE8xuIF8EBzVvqq:LFEnzXk2re4OBHE/rJziM8MIlVvqq
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Wow6432Node = "C:\\Users\\Admin\\AppData\\Roaming\\F052F7.exe" svchost.exe -
Uses the VBS compiler for execution 1 TTPs
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 640 set thread context of 2792 640 86c9166dcde65a227fef3e47f5da6455.exe 28 -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2792 vbc.exe 2792 vbc.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 640 wrote to memory of 2792 640 86c9166dcde65a227fef3e47f5da6455.exe 28 PID 640 wrote to memory of 2792 640 86c9166dcde65a227fef3e47f5da6455.exe 28 PID 640 wrote to memory of 2792 640 86c9166dcde65a227fef3e47f5da6455.exe 28 PID 640 wrote to memory of 2792 640 86c9166dcde65a227fef3e47f5da6455.exe 28 PID 640 wrote to memory of 2792 640 86c9166dcde65a227fef3e47f5da6455.exe 28 PID 640 wrote to memory of 2792 640 86c9166dcde65a227fef3e47f5da6455.exe 28 PID 640 wrote to memory of 2792 640 86c9166dcde65a227fef3e47f5da6455.exe 28 PID 640 wrote to memory of 2792 640 86c9166dcde65a227fef3e47f5da6455.exe 28 PID 640 wrote to memory of 2792 640 86c9166dcde65a227fef3e47f5da6455.exe 28 PID 2792 wrote to memory of 2308 2792 vbc.exe 29 PID 2792 wrote to memory of 2308 2792 vbc.exe 29 PID 2792 wrote to memory of 2308 2792 vbc.exe 29 PID 2792 wrote to memory of 2308 2792 vbc.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\86c9166dcde65a227fef3e47f5da6455.exe"C:\Users\Admin\AppData\Local\Temp\86c9166dcde65a227fef3e47f5da6455.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Adds policy Run key to start application
PID:2308
-
-