Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7 -
submitted
13/07/2020, 11:06
Static task
static1
Behavioral task
behavioral1
Sample
Inv.276.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Inv.276.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
Inv.276.exe
-
Size
564KB
-
MD5
d26aaf27b2cc642cb344d44a92c7ff42
-
SHA1
c91b1fd22f2626262ebe16ca4116c34cb1f22aed
-
SHA256
d6fb73252e37f4b2e507e97ddd633c789f7f947ee48b1e564330f4c1529eefb5
-
SHA512
3ff2d9807ab78ead700880b1582e079c9020d2b92aa1d60662435acdd5d16acb61eb1316acbbeb536448311d5f19c47060a422bed4226ceef497201d09a1db70
Score
9/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1552 set thread context of 1484 1552 Inv.276.exe 25 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1484 Inv.276.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1484 Inv.276.exe 1484 Inv.276.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Inv.276.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Inv.276.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions Inv.276.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools Inv.276.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Inv.276.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Inv.276.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1552 wrote to memory of 1484 1552 Inv.276.exe 25 PID 1552 wrote to memory of 1484 1552 Inv.276.exe 25 PID 1552 wrote to memory of 1484 1552 Inv.276.exe 25 PID 1552 wrote to memory of 1484 1552 Inv.276.exe 25 PID 1552 wrote to memory of 1484 1552 Inv.276.exe 25 PID 1552 wrote to memory of 1484 1552 Inv.276.exe 25 PID 1552 wrote to memory of 1484 1552 Inv.276.exe 25 PID 1552 wrote to memory of 1484 1552 Inv.276.exe 25 PID 1552 wrote to memory of 1484 1552 Inv.276.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\Inv.276.exe"C:\Users\Admin\AppData\Local\Temp\Inv.276.exe"1⤵
- Suspicious use of SetThreadContext
- Checks BIOS information in registry
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\Inv.276.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1484
-