Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
86483fd7121176fce94d6dcb566c67884b7546366fb2e84b5a2d3c407e94af26.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
86483fd7121176fce94d6dcb566c67884b7546366fb2e84b5a2d3c407e94af26.exe
Resource
win10v2004-20220812-en
General
-
Target
86483fd7121176fce94d6dcb566c67884b7546366fb2e84b5a2d3c407e94af26.exe
-
Size
281KB
-
MD5
96eb133b722c92e2d131911d40832841
-
SHA1
2682dde7e3a053b3198e82a475c6fce2781be570
-
SHA256
86483fd7121176fce94d6dcb566c67884b7546366fb2e84b5a2d3c407e94af26
-
SHA512
7ce3a5fc5b8f5b49cce3d49336592ced622bf6cb45a792683a48563a8b808cf664ffb6c581b144562e5409800667b24b7273877c061c8a3c5dc36df0083ecb0e
-
SSDEEP
3072:tUzIEuQdqi7UkyQj/sDZGiCcGIhf3LRrpmiaLSDviTo1OhwY6bV5ppi2Phsygrbf:9ijy7lvLqlevX+wlayO44
Malware Config
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2384 set thread context of 4972 2384 86483fd7121176fce94d6dcb566c67884b7546366fb2e84b5a2d3c407e94af26.exe 83 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 4188 dw20.exe Token: SeBackupPrivilege 4188 dw20.exe Token: SeBackupPrivilege 4188 dw20.exe Token: SeBackupPrivilege 4188 dw20.exe Token: SeBackupPrivilege 4188 dw20.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2384 wrote to memory of 4972 2384 86483fd7121176fce94d6dcb566c67884b7546366fb2e84b5a2d3c407e94af26.exe 83 PID 2384 wrote to memory of 4972 2384 86483fd7121176fce94d6dcb566c67884b7546366fb2e84b5a2d3c407e94af26.exe 83 PID 2384 wrote to memory of 4972 2384 86483fd7121176fce94d6dcb566c67884b7546366fb2e84b5a2d3c407e94af26.exe 83 PID 2384 wrote to memory of 4972 2384 86483fd7121176fce94d6dcb566c67884b7546366fb2e84b5a2d3c407e94af26.exe 83 PID 2384 wrote to memory of 4972 2384 86483fd7121176fce94d6dcb566c67884b7546366fb2e84b5a2d3c407e94af26.exe 83 PID 2384 wrote to memory of 4972 2384 86483fd7121176fce94d6dcb566c67884b7546366fb2e84b5a2d3c407e94af26.exe 83 PID 2384 wrote to memory of 4972 2384 86483fd7121176fce94d6dcb566c67884b7546366fb2e84b5a2d3c407e94af26.exe 83 PID 2384 wrote to memory of 4972 2384 86483fd7121176fce94d6dcb566c67884b7546366fb2e84b5a2d3c407e94af26.exe 83 PID 4972 wrote to memory of 4188 4972 vbc.exe 84 PID 4972 wrote to memory of 4188 4972 vbc.exe 84 PID 4972 wrote to memory of 4188 4972 vbc.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\86483fd7121176fce94d6dcb566c67884b7546366fb2e84b5a2d3c407e94af26.exe"C:\Users\Admin\AppData\Local\Temp\86483fd7121176fce94d6dcb566c67884b7546366fb2e84b5a2d3c407e94af26.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7803⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-