Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 04:39
Static task
static1
Behavioral task
behavioral1
Sample
8b6b84c5fc1d6257ed5ff7fd661cbe23.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b6b84c5fc1d6257ed5ff7fd661cbe23.exe
Resource
win10v2004-20231215-en
General
-
Target
8b6b84c5fc1d6257ed5ff7fd661cbe23.exe
-
Size
523KB
-
MD5
8b6b84c5fc1d6257ed5ff7fd661cbe23
-
SHA1
9f2a893110e002da6c0e274ca314747bd2f07f47
-
SHA256
163495929679f25286835907a1ae6302064c3ff305497e113b77c25a22972bca
-
SHA512
0ef0b62ea3a044f283871102f187a847edc6d1a9b6be791cdd169c9d22b6ea729cb95a5566beeac04654adbb2921bcb925642099fcd96ee0764a2ab35502cc75
-
SSDEEP
12288:AL7GuyK/RFuWzlbyCCVUVrvet55WaVwzOFd2RnKLbNaQ/CX2xVkNTu:UXyidzJynUVc5YaiOGRKXNCuGNq
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8b6b84c5fc1d6257ed5ff7fd661cbe23.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 8b6b84c5fc1d6257ed5ff7fd661cbe23.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 8b6b84c5fc1d6257ed5ff7fd661cbe23.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main 8b6b84c5fc1d6257ed5ff7fd661cbe23.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2444 8b6b84c5fc1d6257ed5ff7fd661cbe23.exe 2444 8b6b84c5fc1d6257ed5ff7fd661cbe23.exe 2444 8b6b84c5fc1d6257ed5ff7fd661cbe23.exe 2444 8b6b84c5fc1d6257ed5ff7fd661cbe23.exe 2444 8b6b84c5fc1d6257ed5ff7fd661cbe23.exe 2444 8b6b84c5fc1d6257ed5ff7fd661cbe23.exe 2444 8b6b84c5fc1d6257ed5ff7fd661cbe23.exe 2444 8b6b84c5fc1d6257ed5ff7fd661cbe23.exe 2444 8b6b84c5fc1d6257ed5ff7fd661cbe23.exe 2444 8b6b84c5fc1d6257ed5ff7fd661cbe23.exe 2444 8b6b84c5fc1d6257ed5ff7fd661cbe23.exe 2444 8b6b84c5fc1d6257ed5ff7fd661cbe23.exe 2444 8b6b84c5fc1d6257ed5ff7fd661cbe23.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b6b84c5fc1d6257ed5ff7fd661cbe23.exe"C:\Users\Admin\AppData\Local\Temp\8b6b84c5fc1d6257ed5ff7fd661cbe23.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2444