Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 20:39
General
-
Target
wevtutil.exe
-
Size
8.2MB
-
MD5
23150d8faa66ce23299e2c032b8fd62f
-
SHA1
26c7c604d01f784931a3a95f1efeb56bfe1aec69
-
SHA256
bbd8b41c49eaee839da5fc62c999761efb835e7eb84f73cbf531cf0dd40c608b
-
SHA512
17ae25cce526a5eb11202cc779f5d62fc45b14a4d547e2eb88694dc21c83fdb853731adfd7cb47fb3499f140ddedf61175415504a0c93cb2ed3b3f25e989f5e7
-
SSDEEP
196608:JzxikPsLoM1ZPdUYcoV1alsmMzU5tReoS+P6n:JzIkP7M1ZP64alnB5t5SF
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ wevtutil.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ migeyih quipaha xajiced banokora ririb bevirov kimatis.exe -
Executes dropped EXE 1 IoCs
pid Process 1996 migeyih quipaha xajiced banokora ririb bevirov kimatis.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wevtutil.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion wevtutil.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion migeyih quipaha xajiced banokora ririb bevirov kimatis.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion migeyih quipaha xajiced banokora ririb bevirov kimatis.exe -
Deletes itself 1 IoCs
pid Process 2028 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1300 wevtutil.exe -
resource yara_rule behavioral1/memory/1300-55-0x0000000000160000-0x00000000009A1000-memory.dmp themida behavioral1/memory/1300-56-0x0000000000160000-0x00000000009A1000-memory.dmp themida behavioral1/files/0x000a0000000122f3-64.dat themida behavioral1/files/0x000a0000000122f3-66.dat themida behavioral1/memory/1996-68-0x0000000001170000-0x00000000019B1000-memory.dmp themida behavioral1/memory/1996-70-0x0000000001170000-0x00000000019B1000-memory.dmp themida behavioral1/memory/1300-72-0x0000000000160000-0x00000000009A1000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wevtutil.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA migeyih quipaha xajiced banokora ririb bevirov kimatis.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1804 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1576 PING.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1300 wevtutil.exe 1300 wevtutil.exe 1300 wevtutil.exe 1300 wevtutil.exe 1300 wevtutil.exe 1996 migeyih quipaha xajiced banokora ririb bevirov kimatis.exe 1996 migeyih quipaha xajiced banokora ririb bevirov kimatis.exe 1996 migeyih quipaha xajiced banokora ririb bevirov kimatis.exe 1996 migeyih quipaha xajiced banokora ririb bevirov kimatis.exe 1996 migeyih quipaha xajiced banokora ririb bevirov kimatis.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1300 wrote to memory of 1804 1300 wevtutil.exe 27 PID 1300 wrote to memory of 1804 1300 wevtutil.exe 27 PID 1300 wrote to memory of 1804 1300 wevtutil.exe 27 PID 1300 wrote to memory of 1804 1300 wevtutil.exe 27 PID 1300 wrote to memory of 1996 1300 wevtutil.exe 29 PID 1300 wrote to memory of 1996 1300 wevtutil.exe 29 PID 1300 wrote to memory of 1996 1300 wevtutil.exe 29 PID 1300 wrote to memory of 1996 1300 wevtutil.exe 29 PID 1300 wrote to memory of 2028 1300 wevtutil.exe 30 PID 1300 wrote to memory of 2028 1300 wevtutil.exe 30 PID 1300 wrote to memory of 2028 1300 wevtutil.exe 30 PID 1300 wrote to memory of 2028 1300 wevtutil.exe 30 PID 2028 wrote to memory of 880 2028 cmd.exe 32 PID 2028 wrote to memory of 880 2028 cmd.exe 32 PID 2028 wrote to memory of 880 2028 cmd.exe 32 PID 2028 wrote to memory of 880 2028 cmd.exe 32 PID 2028 wrote to memory of 1576 2028 cmd.exe 33 PID 2028 wrote to memory of 1576 2028 cmd.exe 33 PID 2028 wrote to memory of 1576 2028 cmd.exe 33 PID 2028 wrote to memory of 1576 2028 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\wevtutil.exe"C:\Users\Admin\AppData\Local\Temp\wevtutil.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\Dage qui podeta xesaxapo copib pab tiqu fixolol pok xowa niweke\migeyih quipaha xajiced banokora ririb bevirov kimatis.exe"2⤵
- Creates scheduled task(s)
PID:1804
-
-
C:\Users\Admin\Dage qui podeta xesaxapo copib pab tiqu fixolol pok xowa niweke\migeyih quipaha xajiced banokora ririb bevirov kimatis.exe"C:\Users\Admin\Dage qui podeta xesaxapo copib pab tiqu fixolol pok xowa niweke\migeyih quipaha xajiced banokora ririb bevirov kimatis.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\wevtutil.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:880
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1576
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Dage qui podeta xesaxapo copib pab tiqu fixolol pok xowa niweke\migeyih quipaha xajiced banokora ririb bevirov kimatis.exe
Filesize254.4MB
MD5f0c49c9f8e31651069de489f6558a541
SHA117dee7c89478c26471e64d73bc14e3b16ee586d5
SHA2562e0ad2a5d544b1ea793693bcfd77b4ecb4da82e4c80148f6623d8dec6dabd961
SHA512f2d365205e2de03ea870789d197e2bb2635ad6776bbc640ccf021a30a1bd33e09da50b53cefd09d33bb93f16c174439c8825e5e25ba2aeb38eb0d8d06d45162f
-
\Users\Admin\Dage qui podeta xesaxapo copib pab tiqu fixolol pok xowa niweke\migeyih quipaha xajiced banokora ririb bevirov kimatis.exe
Filesize249.5MB
MD52e7efc4d2e9cd90388e0c9324f2401dc
SHA131fdcd8878e2e985980b2bc354c26c3457b9990c
SHA25610f9877c01b44d41933282e101e9fa90cf1cb29af6bca880012523cc39d31de8
SHA5121f038a7c5ae26c4785eb714793d3c7a4cfe5ffd462d7648bd21ce4a6e4716f419a3221ee0e1aa87385419f0b03d53420827ed888109f34c1214f2b2af8671555