Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 16:38
Behavioral task
behavioral1
Sample
df9ee1fe42a8f961d7e88d5b1fc760d7.exe
Resource
win7-20231129-en
3 signatures
150 seconds
General
-
Target
df9ee1fe42a8f961d7e88d5b1fc760d7.exe
-
Size
42KB
-
MD5
df9ee1fe42a8f961d7e88d5b1fc760d7
-
SHA1
7f47e6bc1550ada2df49d47c16c4f21a34b328c3
-
SHA256
7d67299e48d2e5499493cd8448f6573e003dcda514dd6af084a5def5dd28ff11
-
SHA512
584d8f88b30d05d35e5b61278e41468bfeca6a4e0a7a6480f31c9d6989fb6aadfb9319204327c2f583b3013aee5372a95c56adc31bf36f8780666d432565ed70
-
SSDEEP
768:ztFmYbuEU2MFBHcDjKRHMUdv1hrlQjoofI7YKmU2ckaLOn:O/HSj4hrlQBnxU2crLO
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\ df9ee1fe42a8f961d7e88d5b1fc760d7.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\df9ee1fe42a8f961d7e88d5b1fc760d7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\df9ee1fe42a8f961d7e88d5b1fc760d7.exe:*:Enabled:DM" df9ee1fe42a8f961d7e88d5b1fc760d7.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplica df9ee1fe42a8f961d7e88d5b1fc760d7.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List df9ee1fe42a8f961d7e88d5b1fc760d7.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile df9ee1fe42a8f961d7e88d5b1fc760d7.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications df9ee1fe42a8f961d7e88d5b1fc760d7.exe -
resource yara_rule behavioral2/memory/1060-0-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral2/memory/1060-2-0x0000000000400000-0x000000000042C000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\DM_Install_Program.job df9ee1fe42a8f961d7e88d5b1fc760d7.exe