Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2022, 14:09
Static task
static1
Behavioral task
behavioral1
Sample
b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe
Resource
win7-20220812-en
General
-
Target
b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe
-
Size
3.8MB
-
MD5
e1167cb7f3735d4edec5f7219cea64ef
-
SHA1
9b32cbdba2f3f40f2072dbeb61b345c910e45b39
-
SHA256
b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17
-
SHA512
e62104b529dfb87203ee3f8406259284663e0d7bc2c02836253c2c1788a0798241377e48d4609cc0ec2295028ff171a746b3fe1537c8cc235a1f3981699122a8
-
SSDEEP
98304:SB/mSwJ/stDHmKRai2+DyAEJ9v00FabNuATit4QqKUiqIa4j1yj:SB/m1/Cfe+i9M0oMP//a48j
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TeamViewer.exe -
Executes dropped EXE 1 IoCs
pid Process 3168 TeamViewer.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TeamViewer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TeamViewer.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation TeamViewer.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GatewayLayer 1.3957.lnk b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Wine TeamViewer.exe -
Loads dropped DLL 3 IoCs
pid Process 3168 TeamViewer.exe 3168 TeamViewer.exe 3168 TeamViewer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3168 TeamViewer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString TeamViewer.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 TeamViewer.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\742C3192E607E424EB4549542BE1BBC53E6174E2 TeamViewer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\742C3192E607E424EB4549542BE1BBC53E6174E2\Blob = 5c0000000100000004000000000400007e0000000100000008000000000010c51e92d201620000000100000020000000e7685634efacf69ace939a6b255b7b4fabef42935b50a265acb5cb6027e44e7009000000010000002a000000302806082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030119000000010000001000000091161b894b117ecdc257628db460cc04030000000100000014000000742c3192e607e424eb4549542be1bbc53e6174e21d000000010000001000000027b3517667331ce2c1e74002b5ff2298140000000100000014000000e27f7bd877d5df9e0a3f9eb4cb0e2ea9efdb69770b000000010000004600000056006500720069005300690067006e00200043006c006100730073002000330020005000750062006c006900630020005000720069006d00610072007900200043004100000004000000010000001000000010fc635df6263e0df325be5f79cd67670f0000000100000010000000d7c63be0837dbabf881d4fbf5f986ad853000000010000002400000030223020060a2b0601040182375e010130123010060a2b0601040182373c0101030200c07a000000010000000e000000300c060a2b0601040182375e010268000000010000000800000000003db65bd9d5012000000001000000400200003082023c308201a5021070bae41d10d92934b638ca7b03ccbabf300d06092a864886f70d0101020500305f310b300906035504061302555331173015060355040a130e566572695369676e2c20496e632e31373035060355040b132e436c6173732033205075626c6963205072696d6172792043657274696669636174696f6e20417574686f72697479301e170d3936303132393030303030305a170d3238303830313233353935395a305f310b300906035504061302555331173015060355040a130e566572695369676e2c20496e632e31373035060355040b132e436c6173732033205075626c6963205072696d6172792043657274696669636174696f6e20417574686f7269747930819f300d06092a864886f70d010101050003818d0030818902818100c95c599ef21b8a0114b410df0440dbe357af6a45408f840c0bd133d9d911cfee02581f25f72aa84405aaec031f787f9e93b99a00aa237dd6ac85a26345c77227ccf44cc67571d239ef4f42f075df0a90c68e206f980ff8ac235f702936a4c986e7b19a20cb53a585e73dbe7d9afe244533dc7615ed0fa271644c652e816845a70203010001300d06092a864886f70d010102050003818100bb4c122bcf2c26004f1413dda6fbfc0a11848cf3281c67922f7cb6c5fadff0e895bc1d8f6c2ca851cc73d8a4c053f04ed626c076015781925e21f1d1b1ffe7d02158cd6917e3441c9c194439895cdc9c000f568d0299eda290454ce4bb10a43df032030ef1cef8e8c9518ce6629fe69fc07db7729cc9363a6b9f4ea8ff640d64 TeamViewer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3168 TeamViewer.exe 3168 TeamViewer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1484 wrote to memory of 3168 1484 b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe 83 PID 1484 wrote to memory of 3168 1484 b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe 83 PID 1484 wrote to memory of 3168 1484 b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe"C:\Users\Admin\AppData\Local\Temp\b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe"1⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\PmIgYzA\TeamViewer.exe"C:\Users\Admin\AppData\Local\Temp\PmIgYzA\TeamViewer.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:3168
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD512890d95c755547a5f206b15ffb51ebc
SHA1abafffe9a34e8acafdf4636a9a3a63bd3eda3179
SHA25628764e617667c9704246c56b613d1b75e489346cbb5df9a14e1ce2d996f5c167
SHA5128f8938e308b15468d771d8d08ed99e2f51fe4a98514271990adbee2a15db088515e07ebbb0f6943ca87c636a7cdcb8260b2d577a85512c20d55ada48aa6f71fe
-
Filesize
4.2MB
MD59dfa2bd6bddc746acea981da411d59d3
SHA181a41c116af135ae25d8bb72baf4b7f6da6b6ec1
SHA256904280f20d697d876ab90a1b74c0f22a83b859e8b0519cb411fda26f1642f53e
SHA512c335cee9885eab824a5cbb37a00f0dac32c1e2857ad58fb0385d7fce3a1fb74472c0af50beb163765f9707ce705672ed2b657fd513dd790df043201db4df1e99
-
Filesize
4.2MB
MD59dfa2bd6bddc746acea981da411d59d3
SHA181a41c116af135ae25d8bb72baf4b7f6da6b6ec1
SHA256904280f20d697d876ab90a1b74c0f22a83b859e8b0519cb411fda26f1642f53e
SHA512c335cee9885eab824a5cbb37a00f0dac32c1e2857ad58fb0385d7fce3a1fb74472c0af50beb163765f9707ce705672ed2b657fd513dd790df043201db4df1e99
-
Filesize
653KB
MD535fa2ce449deb8b93b8ba73bf35e5e7b
SHA1f93ebb91e0f9a0cf98a362be673d3ca655aded9e
SHA2569634ecaf469149379bba80a745f53d823948c41ce4e347860701cbdff6935192
SHA512cc6644c0bdf95e6b972d5121184e79877f68e7749b0563db8d1e2b55118546760ef90a3e1e4b4f65a837dba5876bfc0cb05b3889fc5d18c731c917f5cf6b0218
-
Filesize
653KB
MD535fa2ce449deb8b93b8ba73bf35e5e7b
SHA1f93ebb91e0f9a0cf98a362be673d3ca655aded9e
SHA2569634ecaf469149379bba80a745f53d823948c41ce4e347860701cbdff6935192
SHA512cc6644c0bdf95e6b972d5121184e79877f68e7749b0563db8d1e2b55118546760ef90a3e1e4b4f65a837dba5876bfc0cb05b3889fc5d18c731c917f5cf6b0218
-
Filesize
653KB
MD535fa2ce449deb8b93b8ba73bf35e5e7b
SHA1f93ebb91e0f9a0cf98a362be673d3ca655aded9e
SHA2569634ecaf469149379bba80a745f53d823948c41ce4e347860701cbdff6935192
SHA512cc6644c0bdf95e6b972d5121184e79877f68e7749b0563db8d1e2b55118546760ef90a3e1e4b4f65a837dba5876bfc0cb05b3889fc5d18c731c917f5cf6b0218
-
Filesize
156B
MD5b6bac994a3f222ee614393964025f21c
SHA120f805a0bfc64efafa8bcfe6d7a9d73dc77b8b81
SHA256dbfc0c9d260ab464d30afa0c988cc56fe6911f30fbc8435287e81dcd83b1f255
SHA512f58423aa0d763e2ee7c6e913d0216f905c13539f0b6219643789f95b625b20bfc212310882f0791cf96be12386c62ab01d911258f268daa7975b282e84944753
-
Filesize
2.2MB
MD512890d95c755547a5f206b15ffb51ebc
SHA1abafffe9a34e8acafdf4636a9a3a63bd3eda3179
SHA25628764e617667c9704246c56b613d1b75e489346cbb5df9a14e1ce2d996f5c167
SHA5128f8938e308b15468d771d8d08ed99e2f51fe4a98514271990adbee2a15db088515e07ebbb0f6943ca87c636a7cdcb8260b2d577a85512c20d55ada48aa6f71fe