Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 19:08
Static task
static1
Behavioral task
behavioral1
Sample
6vCuCcOa0q4Qfuu.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6vCuCcOa0q4Qfuu.exe
Resource
win10v2004-20240704-en
General
-
Target
6vCuCcOa0q4Qfuu.exe
-
Size
8.8MB
-
MD5
a8ef06b1272a44e36d271e7764ecea59
-
SHA1
62126ef7097f68eddfe0620143b13682481913b6
-
SHA256
22e8296dcc096f37d2de3d53f2e4c291bcc1ecff63eaab74676a531343225074
-
SHA512
237615240b64b1d716287279ae20d5e62861624c73f353585fcd5c77a9994bbb5cb5f980befd8eec06d3ed7859b6fdb7a807aaf9fb5d1989bb939d33bb056dec
-
SSDEEP
196608:RPRKC5SM3Gxg6M1NzReRjqZ0i5rG/6BolhEAb79w+2hMMgEtKW3jF:3KjMsgLjMRQ1DaPZ7D2mJEtNF
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 6vCuCcOa0q4Qfuu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 6vCuCcOa0q4Qfuu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 6vCuCcOa0q4Qfuu.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4992 6vCuCcOa0q4Qfuu.exe 4992 6vCuCcOa0q4Qfuu.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4992 6vCuCcOa0q4Qfuu.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4992 6vCuCcOa0q4Qfuu.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4992 wrote to memory of 264 4992 6vCuCcOa0q4Qfuu.exe 87 PID 4992 wrote to memory of 264 4992 6vCuCcOa0q4Qfuu.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\6vCuCcOa0q4Qfuu.exe"C:\Users\Admin\AppData\Local\Temp\6vCuCcOa0q4Qfuu.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:264
-