Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
100s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
23/05/2022, 23:50
Static task
static1
Behavioral task
behavioral1
Sample
1b1f3cf5a07eda43fab214b026b2431baec1cf9632d3c0017e8555e87cd0f676.exe
Resource
win7-20220414-en
General
-
Target
1b1f3cf5a07eda43fab214b026b2431baec1cf9632d3c0017e8555e87cd0f676.exe
-
Size
1.6MB
-
MD5
1518649e83f4c956ce199824aab84edd
-
SHA1
22e1c529f39cef4ea6e266323fb4a0d620be9cd1
-
SHA256
1b1f3cf5a07eda43fab214b026b2431baec1cf9632d3c0017e8555e87cd0f676
-
SHA512
595f4ebb9a78672e29b42429b8cf31055f3af2393640aa41ae2766947406005a82267eba33c99ad8f7b5c71bc4a3cf10d890981c27cbffb2f9893e2c08147ed2
Malware Config
Extracted
buer
https://loddd01.info/
https://loddd02.info/
Signatures
-
resource yara_rule behavioral2/memory/1940-131-0x000000003F200000-0x000000003F616000-memory.dmp buer behavioral2/memory/2428-136-0x000000003F750000-0x000000003FB66000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2428 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1b1f3cf5a07eda43fab214b026b2431baec1cf9632d3c0017e8555e87cd0f676.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1b1f3cf5a07eda43fab214b026b2431baec1cf9632d3c0017e8555e87cd0f676.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Wine 1b1f3cf5a07eda43fab214b026b2431baec1cf9632d3c0017e8555e87cd0f676.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Wine plugin.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1940 1b1f3cf5a07eda43fab214b026b2431baec1cf9632d3c0017e8555e87cd0f676.exe 2428 plugin.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4892 2304 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1940 1b1f3cf5a07eda43fab214b026b2431baec1cf9632d3c0017e8555e87cd0f676.exe 1940 1b1f3cf5a07eda43fab214b026b2431baec1cf9632d3c0017e8555e87cd0f676.exe 2428 plugin.exe 2428 plugin.exe 2428 plugin.exe 2428 plugin.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2428 1940 1b1f3cf5a07eda43fab214b026b2431baec1cf9632d3c0017e8555e87cd0f676.exe 89 PID 1940 wrote to memory of 2428 1940 1b1f3cf5a07eda43fab214b026b2431baec1cf9632d3c0017e8555e87cd0f676.exe 89 PID 1940 wrote to memory of 2428 1940 1b1f3cf5a07eda43fab214b026b2431baec1cf9632d3c0017e8555e87cd0f676.exe 89 PID 2428 wrote to memory of 2304 2428 plugin.exe 90 PID 2428 wrote to memory of 2304 2428 plugin.exe 90 PID 2428 wrote to memory of 2304 2428 plugin.exe 90 PID 2428 wrote to memory of 2304 2428 plugin.exe 90 PID 2428 wrote to memory of 2304 2428 plugin.exe 90 PID 2428 wrote to memory of 2304 2428 plugin.exe 90 PID 2428 wrote to memory of 2304 2428 plugin.exe 90 PID 2428 wrote to memory of 2304 2428 plugin.exe 90 PID 2428 wrote to memory of 2304 2428 plugin.exe 90 PID 2428 wrote to memory of 2304 2428 plugin.exe 90 PID 2428 wrote to memory of 2304 2428 plugin.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b1f3cf5a07eda43fab214b026b2431baec1cf9632d3c0017e8555e87cd0f676.exe"C:\Users\Admin\AppData\Local\Temp\1b1f3cf5a07eda43fab214b026b2431baec1cf9632d3c0017e8555e87cd0f676.exe"1⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\1b1f3cf5a07eda43fab214b026b2431baec1cf9632d3c0017e8555e87cd0f676.exe" ensgJJ2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:2304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 2324⤵
- Program crash
PID:4892
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2304 -ip 23041⤵PID:4152
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD51518649e83f4c956ce199824aab84edd
SHA122e1c529f39cef4ea6e266323fb4a0d620be9cd1
SHA2561b1f3cf5a07eda43fab214b026b2431baec1cf9632d3c0017e8555e87cd0f676
SHA512595f4ebb9a78672e29b42429b8cf31055f3af2393640aa41ae2766947406005a82267eba33c99ad8f7b5c71bc4a3cf10d890981c27cbffb2f9893e2c08147ed2
-
Filesize
1.6MB
MD51518649e83f4c956ce199824aab84edd
SHA122e1c529f39cef4ea6e266323fb4a0d620be9cd1
SHA2561b1f3cf5a07eda43fab214b026b2431baec1cf9632d3c0017e8555e87cd0f676
SHA512595f4ebb9a78672e29b42429b8cf31055f3af2393640aa41ae2766947406005a82267eba33c99ad8f7b5c71bc4a3cf10d890981c27cbffb2f9893e2c08147ed2