Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 13:14
Static task
static1
Behavioral task
behavioral1
Sample
cb80869a170419940ac71d58248ff87b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb80869a170419940ac71d58248ff87b.exe
Resource
win10v2004-20240226-en
General
-
Target
cb80869a170419940ac71d58248ff87b.exe
-
Size
960KB
-
MD5
cb80869a170419940ac71d58248ff87b
-
SHA1
b1eddea891c74e3f0cb64aeeb36b62e4581481a4
-
SHA256
14e1964f8262755deca25fb63ad706450dd1495aed9e984dd20207f7cbcd7860
-
SHA512
63ed5a97e21b5bfd3b35eb8ed83f7de8dbada08e0261a8e8d1b42533c74eb3f21d54bc1a956d6d4bd7a28d50787daf37957df66536bf25417ee1316d07e07757
-
SSDEEP
24576:fob9GXioEE6FY5fQ5emJYeXOxXzF6oHU9gfV:fohGXiBE6FY1ps656tgd
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cb80869a170419940ac71d58248ff87b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cb80869a170419940ac71d58248ff87b.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 cb80869a170419940ac71d58248ff87b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum cb80869a170419940ac71d58248ff87b.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4900 set thread context of 1048 4900 cb80869a170419940ac71d58248ff87b.exe 90 -
Program crash 2 IoCs
pid pid_target Process procid_target 3900 1048 WerFault.exe 90 4904 1048 WerFault.exe 90 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1048 cb80869a170419940ac71d58248ff87b.exe 1048 cb80869a170419940ac71d58248ff87b.exe 1048 cb80869a170419940ac71d58248ff87b.exe 1048 cb80869a170419940ac71d58248ff87b.exe 1048 cb80869a170419940ac71d58248ff87b.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4900 wrote to memory of 1048 4900 cb80869a170419940ac71d58248ff87b.exe 90 PID 4900 wrote to memory of 1048 4900 cb80869a170419940ac71d58248ff87b.exe 90 PID 4900 wrote to memory of 1048 4900 cb80869a170419940ac71d58248ff87b.exe 90 PID 4900 wrote to memory of 1048 4900 cb80869a170419940ac71d58248ff87b.exe 90 PID 4900 wrote to memory of 1048 4900 cb80869a170419940ac71d58248ff87b.exe 90 PID 4900 wrote to memory of 1048 4900 cb80869a170419940ac71d58248ff87b.exe 90 PID 4900 wrote to memory of 1048 4900 cb80869a170419940ac71d58248ff87b.exe 90 PID 4900 wrote to memory of 1048 4900 cb80869a170419940ac71d58248ff87b.exe 90 PID 4900 wrote to memory of 1048 4900 cb80869a170419940ac71d58248ff87b.exe 90 PID 4900 wrote to memory of 1048 4900 cb80869a170419940ac71d58248ff87b.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb80869a170419940ac71d58248ff87b.exe"C:\Users\Admin\AppData\Local\Temp\cb80869a170419940ac71d58248ff87b.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\cb80869a170419940ac71d58248ff87b.exe"C:\Users\Admin\AppData\Local\Temp\cb80869a170419940ac71d58248ff87b.exe" Track="0001001000"2⤵
- Suspicious use of SetWindowsHookEx
PID:1048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 20643⤵
- Program crash
PID:3900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 20163⤵
- Program crash
PID:4904
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1048 -ip 10481⤵PID:4804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1048 -ip 10481⤵PID:1976