Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

17/12/2022, 21:13

221217-z25ypsce71 10

17/12/2022, 21:03

221217-zv4gashf38 9

16/12/2022, 21:12

221216-z2nz7aff78 9

Analysis

  • max time kernel
    53s
  • max time network
    74s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16/12/2022, 21:12

General

  • Target

    DWClient_MW2_UA.exe

  • Size

    3.7MB

  • MD5

    e38d0dbee7e09fd594d246afc47d9260

  • SHA1

    d64f65229a27a148d7f9b236ff31cbd9d8fa6868

  • SHA256

    062ac392227a54d5e1d6d7ae481fb4c0e77ab76caf951f49eb7d302ab65478cd

  • SHA512

    46ef448612f4bdcbc6c76edfe9340ea5712e3033657e250080beeba8ef9895b4e6b88e966c149c7cff268e3efb48c251f4ddca319396b062dec8d2316a2e019b

  • SSDEEP

    98304:FPA8TC4jhDZ1iITAXelBy0ql+VVhRMGiWtOHTRFY8YSx/:tDPhDZAIMXey/4vYWQB/

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 8 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DWClient_MW2_UA.exe
    "C:\Users\Admin\AppData\Local\Temp\DWClient_MW2_UA.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:2584

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2584-117-0x00007FF6A2B50000-0x00007FF6A34EC000-memory.dmp

    Filesize

    9.6MB

  • memory/2584-118-0x00007FF6A2B50000-0x00007FF6A34EC000-memory.dmp

    Filesize

    9.6MB

  • memory/2584-119-0x00007FF6A2B50000-0x00007FF6A34EC000-memory.dmp

    Filesize

    9.6MB

  • memory/2584-120-0x00007FF6A2B50000-0x00007FF6A34EC000-memory.dmp

    Filesize

    9.6MB

  • memory/2584-121-0x00007FF6A2B50000-0x00007FF6A34EC000-memory.dmp

    Filesize

    9.6MB

  • memory/2584-122-0x00007FF6A2B50000-0x00007FF6A34EC000-memory.dmp

    Filesize

    9.6MB

  • memory/2584-123-0x00007FF6A2B50000-0x00007FF6A34EC000-memory.dmp

    Filesize

    9.6MB

  • memory/2584-124-0x00007FF6A2B50000-0x00007FF6A34EC000-memory.dmp

    Filesize

    9.6MB