Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 13:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Yeah.exe
Resource
win7-20240215-en
4 signatures
150 seconds
General
-
Target
Yeah.exe
-
Size
4.7MB
-
MD5
82b3a00eb4303992a25ac286cc81a586
-
SHA1
facb18dbd463b8c710b5b5353b1042ea54dec669
-
SHA256
081343ccb0f148c536a0e0811710b55e51d604c0496f2fde5c407cc1e75292eb
-
SHA512
8b41660a7aa32e7472ea57edb4b8817fae9e6f4d6d77eff30b22a3033bc97c70bfbbc6a2f4479e2500585eda059cdeab2acd87c106fe219d109ab6707b6e52f0
-
SSDEEP
98304:zaoiuuvagisE3E6uU2zBlsuVVVHYAj4fB07VY7m9istT:zNbgisCxaBlsQVVHdjpim95T
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Yeah.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Yeah.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Yeah.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Yeah.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2040 Yeah.exe