Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 20:05
Static task
static1
Behavioral task
behavioral1
Sample
cc4f29ee725d609c7649e1631630af74.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc4f29ee725d609c7649e1631630af74.exe
Resource
win10v2004-20240226-en
General
-
Target
cc4f29ee725d609c7649e1631630af74.exe
-
Size
524KB
-
MD5
cc4f29ee725d609c7649e1631630af74
-
SHA1
cab195dc4aaa3fb9d4b3ebabffafe984c442b5f3
-
SHA256
ca1f1d7412cbd20c93ebbadea92adfa317fae94cd9d6fdab4bae191e74b59f8f
-
SHA512
286618d30c2bf3bb7af696ab261b77914c196ef74ec736f7b53804d76a15fa57298d46cde81452b0d2db11f2d99449dd4bca9934beb0e004e4e0005c7361e754
-
SSDEEP
12288:Xmg0X8+XlQRUQdtVM90zCNSPoNNrDxlz83d2EWOW:WJPlQRUWiNMQdDb
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cc4f29ee725d609c7649e1631630af74.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate cc4f29ee725d609c7649e1631630af74.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4172 3124 WerFault.exe 100 -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B81D70BD-FC1A-D91A-5597-C5FF5597C5FF} cc4f29ee725d609c7649e1631630af74.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B81D70BD-FC1A-D91A-5597-C5FF5597C5FF}\ = "{0000031A-0000-0000-C000-000000000046}" cc4f29ee725d609c7649e1631630af74.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1528 wrote to memory of 3124 1528 cc4f29ee725d609c7649e1631630af74.exe 100 PID 1528 wrote to memory of 3124 1528 cc4f29ee725d609c7649e1631630af74.exe 100 PID 1528 wrote to memory of 3124 1528 cc4f29ee725d609c7649e1631630af74.exe 100 PID 1528 wrote to memory of 3124 1528 cc4f29ee725d609c7649e1631630af74.exe 100 PID 1528 wrote to memory of 3124 1528 cc4f29ee725d609c7649e1631630af74.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc4f29ee725d609c7649e1631630af74.exe"C:\Users\Admin\AppData\Local\Temp\cc4f29ee725d609c7649e1631630af74.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\cc4f29ee725d609c7649e1631630af74.exe"C:\Users\Admin\AppData\Local\Temp\cc4f29ee725d609c7649e1631630af74.exe"2⤵
- Checks BIOS information in registry
- Modifies registry class
PID:3124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 11923⤵
- Program crash
PID:4172
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3124 -ip 31241⤵PID:2216
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4416 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:81⤵PID:4420