Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
10s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
6b987fa3ce0cfbc592d819bfd7ae7ffddfea58ecec59b92f54a012e272a23dc6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6b987fa3ce0cfbc592d819bfd7ae7ffddfea58ecec59b92f54a012e272a23dc6.dll
Resource
win10v2004-20220901-en
General
-
Target
6b987fa3ce0cfbc592d819bfd7ae7ffddfea58ecec59b92f54a012e272a23dc6.dll
-
Size
1.5MB
-
MD5
a8d6b38e2b27a2349c52f6697c901dac
-
SHA1
5addff19d2b6f94013881839589fafff851e82c8
-
SHA256
6b987fa3ce0cfbc592d819bfd7ae7ffddfea58ecec59b92f54a012e272a23dc6
-
SHA512
4d1a73ff8c0932f6e077548ff0d95ecea86cc3e0410c5b5ffd2dc5c911c67e45e1eaea57f0a1056273b8909aab86f904ac67a3f23466c109358f42f456b5d72f
-
SSDEEP
24576:p+Y9wzdAUJ8IfB4rEUiPJOokdfZAO/K5u5ZsjqZ2yCl0+IpHJJ9lCtTyF8+Y7afR:p+ywzdFJ8FrEU43/5ZqCpkH3MTyR+anR
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Wine rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1740 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1740 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1608 wrote to memory of 1740 1608 rundll32.exe 14 PID 1608 wrote to memory of 1740 1608 rundll32.exe 14 PID 1608 wrote to memory of 1740 1608 rundll32.exe 14 PID 1608 wrote to memory of 1740 1608 rundll32.exe 14 PID 1608 wrote to memory of 1740 1608 rundll32.exe 14 PID 1608 wrote to memory of 1740 1608 rundll32.exe 14 PID 1608 wrote to memory of 1740 1608 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6b987fa3ce0cfbc592d819bfd7ae7ffddfea58ecec59b92f54a012e272a23dc6.dll,#11⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1740
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6b987fa3ce0cfbc592d819bfd7ae7ffddfea58ecec59b92f54a012e272a23dc6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1608