Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 20:05
Static task
static1
Behavioral task
behavioral1
Sample
cc4f29ee725d609c7649e1631630af74.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc4f29ee725d609c7649e1631630af74.exe
Resource
win10v2004-20240226-en
General
-
Target
cc4f29ee725d609c7649e1631630af74.exe
-
Size
524KB
-
MD5
cc4f29ee725d609c7649e1631630af74
-
SHA1
cab195dc4aaa3fb9d4b3ebabffafe984c442b5f3
-
SHA256
ca1f1d7412cbd20c93ebbadea92adfa317fae94cd9d6fdab4bae191e74b59f8f
-
SHA512
286618d30c2bf3bb7af696ab261b77914c196ef74ec736f7b53804d76a15fa57298d46cde81452b0d2db11f2d99449dd4bca9934beb0e004e4e0005c7361e754
-
SSDEEP
12288:Xmg0X8+XlQRUQdtVM90zCNSPoNNrDxlz83d2EWOW:WJPlQRUWiNMQdDb
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cc4f29ee725d609c7649e1631630af74.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate cc4f29ee725d609c7649e1631630af74.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B81D70BD-FC1A-D91A-5597-C5FF5597C5FF}\InprocServer32 cc4f29ee725d609c7649e1631630af74.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B81D70BD-FC1A-D91A-5597-C5FF5597C5FF}\InprocServer32\ = "C:\\Windows\\SysWOW64\\mfvdsp.dll" cc4f29ee725d609c7649e1631630af74.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B81D70BD-FC1A-D91A-5597-C5FF5597C5FF}\InprocServer32\ThreadingModel = "Both" cc4f29ee725d609c7649e1631630af74.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B81D70BD-FC1A-D91A-5597-C5FF5597C5FF} cc4f29ee725d609c7649e1631630af74.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B81D70BD-FC1A-D91A-5597-C5FF5597C5FF}\ = "CFrameRateConvertDmo" cc4f29ee725d609c7649e1631630af74.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3008 wrote to memory of 1796 3008 cc4f29ee725d609c7649e1631630af74.exe 28 PID 3008 wrote to memory of 1796 3008 cc4f29ee725d609c7649e1631630af74.exe 28 PID 3008 wrote to memory of 1796 3008 cc4f29ee725d609c7649e1631630af74.exe 28 PID 3008 wrote to memory of 1796 3008 cc4f29ee725d609c7649e1631630af74.exe 28 PID 3008 wrote to memory of 1796 3008 cc4f29ee725d609c7649e1631630af74.exe 28 PID 3008 wrote to memory of 1796 3008 cc4f29ee725d609c7649e1631630af74.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc4f29ee725d609c7649e1631630af74.exe"C:\Users\Admin\AppData\Local\Temp\cc4f29ee725d609c7649e1631630af74.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\cc4f29ee725d609c7649e1631630af74.exe"C:\Users\Admin\AppData\Local\Temp\cc4f29ee725d609c7649e1631630af74.exe"2⤵
- Checks BIOS information in registry
- Modifies registry class
PID:1796
-