Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/03/2024, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
b249121878b45fcfdcd320a6b948f982.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b249121878b45fcfdcd320a6b948f982.exe
Resource
win10v2004-20240226-en
General
-
Target
b249121878b45fcfdcd320a6b948f982.exe
-
Size
36KB
-
MD5
b249121878b45fcfdcd320a6b948f982
-
SHA1
7517ece35a9287de84bef853b8ddb3266220993f
-
SHA256
e051b66015c9025ae775dee8adf878daad4fe36268c88fafc9718a8696c6ad89
-
SHA512
7632b78e638d5226604428909dcf9b6e7f52cc725f2b983df7e12f41bc32fc4caf13629f51731a337baa7935a904e5f6aa5be59fc91de605229d9c914b940264
-
SSDEEP
384:hA6EaIMXbxKMi0J8D5MFWgdXTrWzLok1FHPLfwWXtqXx7aIyxF3tX2MCgw9fj5sg:hGaIMXbMMFdXI7v6f
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Host64 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b249121878b45fcfdcd320a6b948f982.exe" b249121878b45fcfdcd320a6b948f982.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch b249121878b45fcfdcd320a6b948f982.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" b249121878b45fcfdcd320a6b948f982.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main b249121878b45fcfdcd320a6b948f982.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2292 b249121878b45fcfdcd320a6b948f982.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2292 b249121878b45fcfdcd320a6b948f982.exe 2292 b249121878b45fcfdcd320a6b948f982.exe 2292 b249121878b45fcfdcd320a6b948f982.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b249121878b45fcfdcd320a6b948f982.exe"C:\Users\Admin\AppData\Local\Temp\b249121878b45fcfdcd320a6b948f982.exe"1⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2292