Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 13:14
Static task
static1
Behavioral task
behavioral1
Sample
cb80869a170419940ac71d58248ff87b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb80869a170419940ac71d58248ff87b.exe
Resource
win10v2004-20240226-en
General
-
Target
cb80869a170419940ac71d58248ff87b.exe
-
Size
960KB
-
MD5
cb80869a170419940ac71d58248ff87b
-
SHA1
b1eddea891c74e3f0cb64aeeb36b62e4581481a4
-
SHA256
14e1964f8262755deca25fb63ad706450dd1495aed9e984dd20207f7cbcd7860
-
SHA512
63ed5a97e21b5bfd3b35eb8ed83f7de8dbada08e0261a8e8d1b42533c74eb3f21d54bc1a956d6d4bd7a28d50787daf37957df66536bf25417ee1316d07e07757
-
SSDEEP
24576:fob9GXioEE6FY5fQ5emJYeXOxXzF6oHU9gfV:fohGXiBE6FY1ps656tgd
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cb80869a170419940ac71d58248ff87b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cb80869a170419940ac71d58248ff87b.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum cb80869a170419940ac71d58248ff87b.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 cb80869a170419940ac71d58248ff87b.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2224 set thread context of 2552 2224 cb80869a170419940ac71d58248ff87b.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main cb80869a170419940ac71d58248ff87b.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2552 cb80869a170419940ac71d58248ff87b.exe 2552 cb80869a170419940ac71d58248ff87b.exe 2552 cb80869a170419940ac71d58248ff87b.exe 2552 cb80869a170419940ac71d58248ff87b.exe 2552 cb80869a170419940ac71d58248ff87b.exe 2552 cb80869a170419940ac71d58248ff87b.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2552 2224 cb80869a170419940ac71d58248ff87b.exe 29 PID 2224 wrote to memory of 2552 2224 cb80869a170419940ac71d58248ff87b.exe 29 PID 2224 wrote to memory of 2552 2224 cb80869a170419940ac71d58248ff87b.exe 29 PID 2224 wrote to memory of 2552 2224 cb80869a170419940ac71d58248ff87b.exe 29 PID 2224 wrote to memory of 2552 2224 cb80869a170419940ac71d58248ff87b.exe 29 PID 2224 wrote to memory of 2552 2224 cb80869a170419940ac71d58248ff87b.exe 29 PID 2224 wrote to memory of 2552 2224 cb80869a170419940ac71d58248ff87b.exe 29 PID 2224 wrote to memory of 2552 2224 cb80869a170419940ac71d58248ff87b.exe 29 PID 2224 wrote to memory of 2552 2224 cb80869a170419940ac71d58248ff87b.exe 29 PID 2224 wrote to memory of 2552 2224 cb80869a170419940ac71d58248ff87b.exe 29 PID 2224 wrote to memory of 2552 2224 cb80869a170419940ac71d58248ff87b.exe 29 PID 2224 wrote to memory of 2552 2224 cb80869a170419940ac71d58248ff87b.exe 29 PID 2224 wrote to memory of 2552 2224 cb80869a170419940ac71d58248ff87b.exe 29 PID 2224 wrote to memory of 2552 2224 cb80869a170419940ac71d58248ff87b.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb80869a170419940ac71d58248ff87b.exe"C:\Users\Admin\AppData\Local\Temp\cb80869a170419940ac71d58248ff87b.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\cb80869a170419940ac71d58248ff87b.exe"C:\Users\Admin\AppData\Local\Temp\cb80869a170419940ac71d58248ff87b.exe" Track="0001001000"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-