Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
116s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 13:10
Behavioral task
behavioral1
Sample
99814997765def04f2bedb65f9624238.exe
Resource
win7-20231215-en
General
-
Target
99814997765def04f2bedb65f9624238.exe
-
Size
49KB
-
MD5
99814997765def04f2bedb65f9624238
-
SHA1
d46420f18738dfdd3ed8687859ebaa21e0d45a60
-
SHA256
bbb64ca7e31759e14b14441ceee0d28cdb6b37253232b3d6618a38baad58f462
-
SHA512
ba3bc2bed5899eb4e677fd0b9fd818266e00ea97fe7abef8600f5646e57b7ab26ec75203ce02233929c65534d51d89093f964a5f1f0b1c03d22173ca2d990f85
-
SSDEEP
768:oWcGhyohheD5a/T7w3qKTaOyX1JkWl5LrOSgDOoxAxoSMzc4RebdLwaNut:oWcsAta/IW9XDkWGS8OolzuhVNu
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\99814997765def04f2bedb65f9624238.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\99814997765def04f2bedb65f9624238.exe:*:Enabled:ldrsoft" 99814997765def04f2bedb65f9624238.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 99814997765def04f2bedb65f9624238.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 99814997765def04f2bedb65f9624238.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 99814997765def04f2bedb65f9624238.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 99814997765def04f2bedb65f9624238.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3208-0-0x0000000000400000-0x000000000145B000-memory.dmp upx behavioral2/memory/3208-1-0x0000000000400000-0x000000000145B000-memory.dmp upx behavioral2/memory/3208-3-0x0000000000400000-0x000000000145B000-memory.dmp upx behavioral2/memory/3208-4-0x0000000000400000-0x000000000145B000-memory.dmp upx behavioral2/memory/3208-7-0x0000000000400000-0x000000000145B000-memory.dmp upx behavioral2/memory/3208-10-0x0000000000400000-0x000000000145B000-memory.dmp upx behavioral2/memory/3208-12-0x0000000000400000-0x000000000145B000-memory.dmp upx behavioral2/memory/3208-14-0x0000000000400000-0x000000000145B000-memory.dmp upx behavioral2/memory/3208-16-0x0000000000400000-0x000000000145B000-memory.dmp upx behavioral2/memory/3208-19-0x0000000000400000-0x000000000145B000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3208 wrote to memory of 760 3208 99814997765def04f2bedb65f9624238.exe 92 PID 3208 wrote to memory of 760 3208 99814997765def04f2bedb65f9624238.exe 92 PID 3208 wrote to memory of 760 3208 99814997765def04f2bedb65f9624238.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\99814997765def04f2bedb65f9624238.exe"C:\Users\Admin\AppData\Local\Temp\99814997765def04f2bedb65f9624238.exe"1⤵
- Modifies firewall policy service
- Checks BIOS information in registry
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\998149~1.EXE00.bat2⤵PID:760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5e1125d10c5ff0212222e35c3e935d602
SHA153f19b2631c5d466e141d8f4f94b24c36473985d
SHA2566f5b2c9c71e965046eb32bf6a3b08acd8a5edad47cb595243a50ab55fb7cb4ff
SHA512994ed79bf81b36febab9904e921ac035f18480aa5715ede30176e9e47a2c2a934753627980a898b5b1b852c9bf206b6aadd9330bc6c15e6e72278f5af05c01bc