Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 01:34
Static task
static1
Behavioral task
behavioral1
Sample
177f9fed6abb3801b701457c0fea138086add80fa8986c7cb49584de3ec021e3.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
177f9fed6abb3801b701457c0fea138086add80fa8986c7cb49584de3ec021e3.dll
Resource
win10v2004-20220812-en
General
-
Target
177f9fed6abb3801b701457c0fea138086add80fa8986c7cb49584de3ec021e3.dll
-
Size
796KB
-
MD5
64bf8a9813c92790429afbe6e1f25fb5
-
SHA1
3fd8ec56d32d58c1bb6cfb8c87a7dbaa17577b5a
-
SHA256
177f9fed6abb3801b701457c0fea138086add80fa8986c7cb49584de3ec021e3
-
SHA512
dfb11c659eb237ec9daecf9d886a7bd247e3efb55e73aadedff057340965ef31514734ff25997887cbd47395d9d7f248a3aa180bab03491a1ffd4f58853bc699
-
SSDEEP
24576:CiIrRJ+sN0lgJ+n7gt55XSRaYU5uNNfxHq8QMuFP08OtL:CiCRXN0lBgtLSE55EjPFtL
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Wine rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\User\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Temp = "RUNDLL32.EXE C:\\Users\\Admin\\AppData\\Local\\Temp\\177f9fed6abb3801b701457c0fea138086add80fa8986c7cb49584de3ec021e3.dll,qtgropqswisf" rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1832 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1832 rundll32.exe 1832 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1832 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1832 1960 rundll32.exe 28 PID 1960 wrote to memory of 1832 1960 rundll32.exe 28 PID 1960 wrote to memory of 1832 1960 rundll32.exe 28 PID 1960 wrote to memory of 1832 1960 rundll32.exe 28 PID 1960 wrote to memory of 1832 1960 rundll32.exe 28 PID 1960 wrote to memory of 1832 1960 rundll32.exe 28 PID 1960 wrote to memory of 1832 1960 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\177f9fed6abb3801b701457c0fea138086add80fa8986c7cb49584de3ec021e3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\177f9fed6abb3801b701457c0fea138086add80fa8986c7cb49584de3ec021e3.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1832
-