Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 04:18
Static task
static1
Behavioral task
behavioral1
Sample
f0f7cf9a133b7a22c26f2da01485aa2ee3a31feac53b40fc724757d66ba885e2.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f0f7cf9a133b7a22c26f2da01485aa2ee3a31feac53b40fc724757d66ba885e2.dll
Resource
win10v2004-20220901-en
General
-
Target
f0f7cf9a133b7a22c26f2da01485aa2ee3a31feac53b40fc724757d66ba885e2.dll
-
Size
844KB
-
MD5
5260a2fed6633021f08357915fc08750
-
SHA1
0b6a111d776ec11829ce05a354ca705a44797d9b
-
SHA256
f0f7cf9a133b7a22c26f2da01485aa2ee3a31feac53b40fc724757d66ba885e2
-
SHA512
8494ce4c239e4f6f849de843021f2b42276f6ee05189e2edd0a8f6793ecaf472ac9a7deaee4b858b4c45386de7797623b3b9cfe58ec41273c6b71487492cd671
-
SSDEEP
24576:oDSJtY1VsHzGFtHyLKDc2a9khoC7XXF8:oD6HHzKSLKQ21TXF
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Wine regsvr32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4616 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4616 regsvr32.exe 4616 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2116 wrote to memory of 4616 2116 regsvr32.exe 85 PID 2116 wrote to memory of 4616 2116 regsvr32.exe 85 PID 2116 wrote to memory of 4616 2116 regsvr32.exe 85
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\f0f7cf9a133b7a22c26f2da01485aa2ee3a31feac53b40fc724757d66ba885e2.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\f0f7cf9a133b7a22c26f2da01485aa2ee3a31feac53b40fc724757d66ba885e2.dll2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4616
-