Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/10/2022, 14:09

General

  • Target

    b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe

  • Size

    3.8MB

  • MD5

    e1167cb7f3735d4edec5f7219cea64ef

  • SHA1

    9b32cbdba2f3f40f2072dbeb61b345c910e45b39

  • SHA256

    b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17

  • SHA512

    e62104b529dfb87203ee3f8406259284663e0d7bc2c02836253c2c1788a0798241377e48d4609cc0ec2295028ff171a746b3fe1537c8cc235a1f3981699122a8

  • SSDEEP

    98304:SB/mSwJ/stDHmKRai2+DyAEJ9v00FabNuATit4QqKUiqIa4j1yj:SB/m1/Cfe+i9M0oMP//a48j

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe
    "C:\Users\Admin\AppData\Local\Temp\b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:1484
    • C:\Users\Admin\AppData\Local\Temp\PmIgYzA\TeamViewer.exe
      "C:\Users\Admin\AppData\Local\Temp\PmIgYzA\TeamViewer.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks computer location settings
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      PID:3168

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\PmIgYzA\TV.dll

    Filesize

    2.2MB

    MD5

    12890d95c755547a5f206b15ffb51ebc

    SHA1

    abafffe9a34e8acafdf4636a9a3a63bd3eda3179

    SHA256

    28764e617667c9704246c56b613d1b75e489346cbb5df9a14e1ce2d996f5c167

    SHA512

    8f8938e308b15468d771d8d08ed99e2f51fe4a98514271990adbee2a15db088515e07ebbb0f6943ca87c636a7cdcb8260b2d577a85512c20d55ada48aa6f71fe

  • C:\Users\Admin\AppData\Local\Temp\PmIgYzA\TeamViewer.exe

    Filesize

    4.2MB

    MD5

    9dfa2bd6bddc746acea981da411d59d3

    SHA1

    81a41c116af135ae25d8bb72baf4b7f6da6b6ec1

    SHA256

    904280f20d697d876ab90a1b74c0f22a83b859e8b0519cb411fda26f1642f53e

    SHA512

    c335cee9885eab824a5cbb37a00f0dac32c1e2857ad58fb0385d7fce3a1fb74472c0af50beb163765f9707ce705672ed2b657fd513dd790df043201db4df1e99

  • C:\Users\Admin\AppData\Local\Temp\PmIgYzA\TeamViewer.exe

    Filesize

    4.2MB

    MD5

    9dfa2bd6bddc746acea981da411d59d3

    SHA1

    81a41c116af135ae25d8bb72baf4b7f6da6b6ec1

    SHA256

    904280f20d697d876ab90a1b74c0f22a83b859e8b0519cb411fda26f1642f53e

    SHA512

    c335cee9885eab824a5cbb37a00f0dac32c1e2857ad58fb0385d7fce3a1fb74472c0af50beb163765f9707ce705672ed2b657fd513dd790df043201db4df1e99

  • C:\Users\Admin\AppData\Local\Temp\PmIgYzA\TeamViewer_Resource_fr.DLL

    Filesize

    653KB

    MD5

    35fa2ce449deb8b93b8ba73bf35e5e7b

    SHA1

    f93ebb91e0f9a0cf98a362be673d3ca655aded9e

    SHA256

    9634ecaf469149379bba80a745f53d823948c41ce4e347860701cbdff6935192

    SHA512

    cc6644c0bdf95e6b972d5121184e79877f68e7749b0563db8d1e2b55118546760ef90a3e1e4b4f65a837dba5876bfc0cb05b3889fc5d18c731c917f5cf6b0218

  • C:\Users\Admin\AppData\Local\Temp\PmIgYzA\Teamviewer_Resource_fr.dll

    Filesize

    653KB

    MD5

    35fa2ce449deb8b93b8ba73bf35e5e7b

    SHA1

    f93ebb91e0f9a0cf98a362be673d3ca655aded9e

    SHA256

    9634ecaf469149379bba80a745f53d823948c41ce4e347860701cbdff6935192

    SHA512

    cc6644c0bdf95e6b972d5121184e79877f68e7749b0563db8d1e2b55118546760ef90a3e1e4b4f65a837dba5876bfc0cb05b3889fc5d18c731c917f5cf6b0218

  • C:\Users\Admin\AppData\Local\Temp\PmIgYzA\Teamviewer_Resource_fr.dll

    Filesize

    653KB

    MD5

    35fa2ce449deb8b93b8ba73bf35e5e7b

    SHA1

    f93ebb91e0f9a0cf98a362be673d3ca655aded9e

    SHA256

    9634ecaf469149379bba80a745f53d823948c41ce4e347860701cbdff6935192

    SHA512

    cc6644c0bdf95e6b972d5121184e79877f68e7749b0563db8d1e2b55118546760ef90a3e1e4b4f65a837dba5876bfc0cb05b3889fc5d18c731c917f5cf6b0218

  • C:\Users\Admin\AppData\Local\Temp\PmIgYzA\config.bin

    Filesize

    156B

    MD5

    b6bac994a3f222ee614393964025f21c

    SHA1

    20f805a0bfc64efafa8bcfe6d7a9d73dc77b8b81

    SHA256

    dbfc0c9d260ab464d30afa0c988cc56fe6911f30fbc8435287e81dcd83b1f255

    SHA512

    f58423aa0d763e2ee7c6e913d0216f905c13539f0b6219643789f95b625b20bfc212310882f0791cf96be12386c62ab01d911258f268daa7975b282e84944753

  • C:\Users\Admin\AppData\Local\Temp\PmIgYzA\tv.dll

    Filesize

    2.2MB

    MD5

    12890d95c755547a5f206b15ffb51ebc

    SHA1

    abafffe9a34e8acafdf4636a9a3a63bd3eda3179

    SHA256

    28764e617667c9704246c56b613d1b75e489346cbb5df9a14e1ce2d996f5c167

    SHA512

    8f8938e308b15468d771d8d08ed99e2f51fe4a98514271990adbee2a15db088515e07ebbb0f6943ca87c636a7cdcb8260b2d577a85512c20d55ada48aa6f71fe

  • memory/3168-140-0x0000000013140000-0x0000000013821000-memory.dmp

    Filesize

    6.9MB

  • memory/3168-142-0x0000000077140000-0x00000000772E3000-memory.dmp

    Filesize

    1.6MB

  • memory/3168-143-0x0000000013140000-0x0000000013821000-memory.dmp

    Filesize

    6.9MB

  • memory/3168-144-0x0000000013140000-0x0000000013821000-memory.dmp

    Filesize

    6.9MB

  • memory/3168-145-0x0000000077140000-0x00000000772E3000-memory.dmp

    Filesize

    1.6MB

  • memory/3168-146-0x0000000013140000-0x0000000013821000-memory.dmp

    Filesize

    6.9MB