Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
17/12/2022, 21:13
221217-z25ypsce71 1017/12/2022, 21:03
221217-zv4gashf38 916/12/2022, 21:12
221216-z2nz7aff78 9Analysis
-
max time kernel
53s -
max time network
74s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
16/12/2022, 21:12
General
-
Target
DWClient_MW2_UA.exe
-
Size
3.7MB
-
MD5
e38d0dbee7e09fd594d246afc47d9260
-
SHA1
d64f65229a27a148d7f9b236ff31cbd9d8fa6868
-
SHA256
062ac392227a54d5e1d6d7ae481fb4c0e77ab76caf951f49eb7d302ab65478cd
-
SHA512
46ef448612f4bdcbc6c76edfe9340ea5712e3033657e250080beeba8ef9895b4e6b88e966c149c7cff268e3efb48c251f4ddca319396b062dec8d2316a2e019b
-
SSDEEP
98304:FPA8TC4jhDZ1iITAXelBy0ql+VVhRMGiWtOHTRFY8YSx/:tDPhDZAIMXey/4vYWQB/
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DWClient_MW2_UA.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DWClient_MW2_UA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DWClient_MW2_UA.exe -
resource yara_rule behavioral1/memory/2584-117-0x00007FF6A2B50000-0x00007FF6A34EC000-memory.dmp themida behavioral1/memory/2584-118-0x00007FF6A2B50000-0x00007FF6A34EC000-memory.dmp themida behavioral1/memory/2584-119-0x00007FF6A2B50000-0x00007FF6A34EC000-memory.dmp themida behavioral1/memory/2584-120-0x00007FF6A2B50000-0x00007FF6A34EC000-memory.dmp themida behavioral1/memory/2584-121-0x00007FF6A2B50000-0x00007FF6A34EC000-memory.dmp themida behavioral1/memory/2584-122-0x00007FF6A2B50000-0x00007FF6A34EC000-memory.dmp themida behavioral1/memory/2584-123-0x00007FF6A2B50000-0x00007FF6A34EC000-memory.dmp themida behavioral1/memory/2584-124-0x00007FF6A2B50000-0x00007FF6A34EC000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DWClient_MW2_UA.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2584 DWClient_MW2_UA.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DWClient_MW2_UA.exe"C:\Users\Admin\AppData\Local\Temp\DWClient_MW2_UA.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2584