Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 02:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
885f4a8ee6ccb6e9bbe48581fcc31b35.exe
Resource
win7-20231215-en
2 signatures
150 seconds
General
-
Target
885f4a8ee6ccb6e9bbe48581fcc31b35.exe
-
Size
180KB
-
MD5
885f4a8ee6ccb6e9bbe48581fcc31b35
-
SHA1
3efe1ac183c5a5409a1e64149db5b951d69291ff
-
SHA256
937e47ee0d3c308cfa1c64248db4d12c67ed97259b3d7706020a3759937648ec
-
SHA512
16941acb8d10a0a9acb3ce64e8db34a1090218b80dd45753d21b389d78beb5f81b63fe4f17cdb6f8ef7305ed6584c88d4ec2ac955b528e203cf9254e32757ab5
-
SSDEEP
3072:M1HqkyWxsFhpTgqDYVlkUEgdqw+TO3LSQPBobM5RDoSlogQB:OK3dNEzkvVQ5oARsX
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1160 dw20.exe Token: SeBackupPrivilege 1160 dw20.exe Token: SeBackupPrivilege 1160 dw20.exe Token: SeBackupPrivilege 1160 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1824 wrote to memory of 1160 1824 885f4a8ee6ccb6e9bbe48581fcc31b35.exe 84 PID 1824 wrote to memory of 1160 1824 885f4a8ee6ccb6e9bbe48581fcc31b35.exe 84 PID 1824 wrote to memory of 1160 1824 885f4a8ee6ccb6e9bbe48581fcc31b35.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\885f4a8ee6ccb6e9bbe48581fcc31b35.exe"C:\Users\Admin\AppData\Local\Temp\885f4a8ee6ccb6e9bbe48581fcc31b35.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8842⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1160
-