Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
26/09/2022, 13:23
220926-qm7djsahd3 926/09/2022, 13:23
220926-qmv1hscagq 126/09/2022, 13:21
220926-ql5tbsahc8 125/09/2022, 11:08
220925-m8t4kaffem 3Analysis
-
max time kernel
58s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26/09/2022, 13:23
Static task
static1
Behavioral task
behavioral1
Sample
StOMW0ci.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
StOMW0ci.dll
Resource
win10v2004-20220901-en
General
-
Target
StOMW0ci.dll
-
Size
2.5MB
-
MD5
30f0b4c68317a320227389dc671e32c2
-
SHA1
4cc428c3355504fbc7fa68ab44c4f8c43938adc1
-
SHA256
0213a0d183b593976c20511515be077f94595a3993bfc496e9c4783a506c147e
-
SHA512
9f8f9651189a84f9177d2ac14bb73f563f549127e5b5700892127911f93edfb5f80a40469eefa37d0baa2073c47c9b5d01d47cee831fa704ac77d1972bedf746
-
SSDEEP
49152:/UV3vnVxDtgL47ZbH8TGN8DC9Vj7iRJrd1skW3/gsykrC+PhqJlT89i3FCQuweF7:SVNtSYZbH8TGNYC9Vj7iRJrbskg/gsya
Malware Config
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo rundll32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ rundll32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions rundll32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Wine rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1840 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1172 1824 WerFault.exe 9 -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1824 wrote to memory of 1172 1824 rundll32.exe 27 PID 1824 wrote to memory of 1172 1824 rundll32.exe 27 PID 1824 wrote to memory of 1172 1824 rundll32.exe 27 PID 1960 wrote to memory of 1840 1960 cmd.exe 30 PID 1960 wrote to memory of 1840 1960 cmd.exe 30 PID 1960 wrote to memory of 1840 1960 cmd.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\StOMW0ci.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1824 -s 842⤵
- Program crash
PID:1172
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
\??\c:\Windows\System32\rundll32.exec:\Windows\System32\rundll32.exe StOMW0ci.dll, maincase2⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1840
-