Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 01:08
Static task
static1
Behavioral task
behavioral1
Sample
f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe
Resource
win10v2004-20240802-en
General
-
Target
f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe
-
Size
419KB
-
MD5
08f7810665e4dbb40c5db0d84ef3ad4d
-
SHA1
7c040c50defde66532deec7abaeee7c5dc6a982a
-
SHA256
f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749
-
SHA512
c3a2706ae0c02e2b3a436735b5727ef9ab5766b5fe6f692f5aaa2f5573d2241a4e9ad4547d08b08572d0a23c9842bbfd3c5240b7930397aa8de1c6fca366f530
-
SSDEEP
3072:5KGqnK/ItyRZ4F/UqtRFe4Se28Chsnp22x8VfoESO/i:57ItT5Uiz23Yp2O2gESO/i
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe -
Checks processor information in registry 2 TTPs 16 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier = "x86 Family 6 Model 61 Stepping 2" f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe Set value (int) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet = "3099311615" f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe Set value (int) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz = "4192" f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe Set value (int) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz = "4192" f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString = "Intel Core Processor (Broadwell)" f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString = "Intel Core Processor (Broadwell)" f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier = "AuthenticAMD" f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe Set value (int) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet = "3099311615" f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier = "AuthenticAMD" f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier = "x86 Family 6 Model 61 Stepping 2" f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe -
Enumerates system info in registry 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\1\Identifier = "x86 Family 6 Model 61 Stepping 2" f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier = "AT compatible" f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\0 f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\1 f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\1 f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\0 f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\0\Identifier = "x86 Family 6 Model 61 Stepping 2" f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe"C:\Users\Admin\AppData\Local\Temp\f845b507c1b4673dde3f9e6df865e2cd7ba4390cddb8b58d5063bba1ad374749.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:4336