Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 03:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ba740f5c52b0ebc6b39144733f354694.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
ba740f5c52b0ebc6b39144733f354694.exe
-
Size
866KB
-
MD5
ba740f5c52b0ebc6b39144733f354694
-
SHA1
cfa891a486ba9ec5768745a4e76bf96c3bf6c1a3
-
SHA256
9e63e6cf0ce1bef723b4a85e1373ae7e9f987258c7bde822cd4b4868853604f7
-
SHA512
cb19bb4a89af1447fa23ab17262d5efb621316cbbac437727016655b963265bc6fdf3dda1140a921581bb6aa9470df0767538eb7ff2d45b660c8002da19c91ee
-
SSDEEP
24576:GCrHGn1bYlkjv5hJ3MIAtDO6oRqBTmwC7rjHqJfr:nHGn1Lv57SK6oRaCXjKRr
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ba740f5c52b0ebc6b39144733f354694.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Software\Microsoft\Internet Explorer\IESettingSync ba740f5c52b0ebc6b39144733f354694.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" ba740f5c52b0ebc6b39144733f354694.exe Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch ba740f5c52b0ebc6b39144733f354694.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" ba740f5c52b0ebc6b39144733f354694.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3092 ba740f5c52b0ebc6b39144733f354694.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3092 ba740f5c52b0ebc6b39144733f354694.exe 3092 ba740f5c52b0ebc6b39144733f354694.exe