Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 11:30
Static task
static1
Behavioral task
behavioral1
Sample
86c9166dcde65a227fef3e47f5da6455.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
86c9166dcde65a227fef3e47f5da6455.exe
Resource
win10v2004-20231215-en
General
-
Target
86c9166dcde65a227fef3e47f5da6455.exe
-
Size
38KB
-
MD5
86c9166dcde65a227fef3e47f5da6455
-
SHA1
d8af07be04f0178c825c10e46925c370d81ffa5c
-
SHA256
8d1acbee7dd47792bb564205548ff8f6b7293eef562358413690a1b3363bb889
-
SHA512
ba8db33918abab0af0b2a8e1a8bcd66d5542bbe87fd1863d6055da9902519737804e40761180ef87e1fb8bd892f6e022b0b927c88f0ba1c3244526495bb40467
-
SSDEEP
768:L2YEdlz5Fk2reUdkvB6xuE/6OJzifE8xuIF8EBzVvqq:LFEnzXk2re4OBHE/rJziM8MIlVvqq
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\8F2883.exe" svchost.exe -
Uses the VBS compiler for execution 1 TTPs
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4224 set thread context of 2524 4224 86c9166dcde65a227fef3e47f5da6455.exe 49 -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2524 vbc.exe 2524 vbc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4224 wrote to memory of 2524 4224 86c9166dcde65a227fef3e47f5da6455.exe 49 PID 4224 wrote to memory of 2524 4224 86c9166dcde65a227fef3e47f5da6455.exe 49 PID 4224 wrote to memory of 2524 4224 86c9166dcde65a227fef3e47f5da6455.exe 49 PID 4224 wrote to memory of 2524 4224 86c9166dcde65a227fef3e47f5da6455.exe 49 PID 4224 wrote to memory of 2524 4224 86c9166dcde65a227fef3e47f5da6455.exe 49 PID 4224 wrote to memory of 2524 4224 86c9166dcde65a227fef3e47f5da6455.exe 49 PID 4224 wrote to memory of 2524 4224 86c9166dcde65a227fef3e47f5da6455.exe 49 PID 4224 wrote to memory of 2524 4224 86c9166dcde65a227fef3e47f5da6455.exe 49 PID 4224 wrote to memory of 2524 4224 86c9166dcde65a227fef3e47f5da6455.exe 49 PID 2524 wrote to memory of 3800 2524 vbc.exe 95 PID 2524 wrote to memory of 3800 2524 vbc.exe 95 PID 2524 wrote to memory of 3800 2524 vbc.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\86c9166dcde65a227fef3e47f5da6455.exe"C:\Users\Admin\AppData\Local\Temp\86c9166dcde65a227fef3e47f5da6455.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Adds policy Run key to start application
PID:3800
-
-