Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
88s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
c6191c2bf92b4395b281630960aa07c1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c6191c2bf92b4395b281630960aa07c1.exe
Resource
win10v2004-20231215-en
General
-
Target
c6191c2bf92b4395b281630960aa07c1.exe
-
Size
324KB
-
MD5
c6191c2bf92b4395b281630960aa07c1
-
SHA1
4590ac16a2998ac183fa9b8707a4558ea75ff196
-
SHA256
0542def8d0f550207778c3d6b212a2d5f96b98754ccc21dcab8d2da163c9c38a
-
SHA512
b4c8405185d21df4f86453b9ed9c62020cd3ae01c770cf98e6a4af684ab15cf544b8a086ff58efe6949ed7431f3d097cd41e3e86010cb9879d1efad7a522eb4e
-
SSDEEP
6144:ExebA+raHjBXJXJc3GuffBkDGfMSUPbeWL4t:gYA0aHtX/c1fuPpL4t
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum c6191c2bf92b4395b281630960aa07c1.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum c6191c2bf92b4395b281630960aa07c1.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\FontCollection.job c6191c2bf92b4395b281630960aa07c1.exe