Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
107s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2023, 07:03
Static task
static1
Behavioral task
behavioral1
Sample
3714bf1b2ccb2d589bbf9fc56b95f34f.exe
Resource
win7-20220901-en
General
-
Target
3714bf1b2ccb2d589bbf9fc56b95f34f.exe
-
Size
3.8MB
-
MD5
3714bf1b2ccb2d589bbf9fc56b95f34f
-
SHA1
094ca2a456841a37d53724f9cd242af7f2a87945
-
SHA256
4063e9392a870c336313c33c498fccff27bc86a20b925e3d9d418b20613eee4b
-
SHA512
44271307b886aadc028e5874444d4241ba9790bba8fa7cf8b93371f051261b2adab065012fa84ce8674a43df07bdba63761cb614dc0c986982718a2276f241bc
-
SSDEEP
98304:TY+I/xOyEEaO5PsR9urjsFFZ9iZ1+AhMr+rCIvdvA92RxHGf:TZI/AyEEf5zrIZ9i+9rBKxlhm
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3714bf1b2ccb2d589bbf9fc56b95f34f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svcupdater.exe -
Executes dropped EXE 1 IoCs
pid Process 4952 svcupdater.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3714bf1b2ccb2d589bbf9fc56b95f34f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3714bf1b2ccb2d589bbf9fc56b95f34f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svcupdater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svcupdater.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3714bf1b2ccb2d589bbf9fc56b95f34f.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3714bf1b2ccb2d589bbf9fc56b95f34f.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svcupdater.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2656 schtasks.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2656 3008 3714bf1b2ccb2d589bbf9fc56b95f34f.exe 82 PID 3008 wrote to memory of 2656 3008 3714bf1b2ccb2d589bbf9fc56b95f34f.exe 82 PID 3008 wrote to memory of 2656 3008 3714bf1b2ccb2d589bbf9fc56b95f34f.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\3714bf1b2ccb2d589bbf9fc56b95f34f.exe"C:\Users\Admin\AppData\Local\Temp\3714bf1b2ccb2d589bbf9fc56b95f34f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "svcupdater" /tr "C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f2⤵
- Creates scheduled task(s)
PID:2656
-
-
C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exeC:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:4952
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274.8MB
MD50706c5df98c839b049a41c1d119225e7
SHA1581eb4be37324862802a2900cbf2db5ea940f564
SHA2569c48442514a7fe9aa08351247fa543444c0beb52392d8d2fa44dbad0064e3760
SHA512c4363ff9c4d530e13cfd30c9897bb8cf946b39818a99e883bae2d75c6e9924455c1217b33d0edd3d3e3f0c8af4ddafa8978535b1fe907ed4e460423a19b91dfe
-
Filesize
272.3MB
MD51d232e9a5aef4979d62acd23229a421d
SHA1fe9761736fda2e1152e5ec99f3165702b021dbb0
SHA256fd24a7fb3fd74998accf0e2408319812bf0aa5b94130df83a2aa26d53331a88c
SHA5123c37df6c71379fda2a74b87f917941bc027283db547d3724f8b85066a6a6fb67d2edb0787a78c6f85bf89ec02a1ef953ff7962f8f56f3d2dc1d0afb7332b444a