Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
14/01/2023, 22:17
Behavioral task
behavioral1
Sample
48f6242537331f5142237c388fc8fa1f52eecd568af2af01695342b1d17c4fd4.exe
Resource
win7-20221111-en
General
-
Target
48f6242537331f5142237c388fc8fa1f52eecd568af2af01695342b1d17c4fd4.exe
-
Size
3.8MB
-
MD5
12d16c90620269cc665ce370dbe15784
-
SHA1
72fa84e606ee749844143e5904c14975e2d5d98c
-
SHA256
48f6242537331f5142237c388fc8fa1f52eecd568af2af01695342b1d17c4fd4
-
SHA512
aa0d992d1c9353a79d3d7984b1031b950b4022850c164ef6453f65de680f8d8d7b5d389feae2f494cde8403b7af000a3a90b78b19de36f23594db31b2ab74b67
-
SSDEEP
98304:aLa6vbZldIleZXkleKgxYC+ywWj5fr1018mHXM:aLa6vbZlmleZX7KAYCuWjhr12u
Malware Config
Extracted
laplas
45.159.189.105
-
api_key
7ee57b1f6d4aff08f9755119b18cf0754b677addcb6a3063066112b10a357a8e
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 48f6242537331f5142237c388fc8fa1f52eecd568af2af01695342b1d17c4fd4.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 48f6242537331f5142237c388fc8fa1f52eecd568af2af01695342b1d17c4fd4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 48f6242537331f5142237c388fc8fa1f52eecd568af2af01695342b1d17c4fd4.exe -
resource yara_rule behavioral1/memory/2008-55-0x00000000008B0000-0x0000000001282000-memory.dmp themida behavioral1/memory/2008-56-0x00000000008B0000-0x0000000001282000-memory.dmp themida behavioral1/memory/2008-57-0x00000000008B0000-0x0000000001282000-memory.dmp themida behavioral1/memory/2008-58-0x00000000008B0000-0x0000000001282000-memory.dmp themida behavioral1/memory/2008-60-0x00000000008B0000-0x0000000001282000-memory.dmp themida behavioral1/memory/2008-62-0x00000000008B0000-0x0000000001282000-memory.dmp themida behavioral1/memory/2008-63-0x00000000008B0000-0x0000000001282000-memory.dmp themida behavioral1/memory/2008-64-0x00000000008B0000-0x0000000001282000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 48f6242537331f5142237c388fc8fa1f52eecd568af2af01695342b1d17c4fd4.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2008 48f6242537331f5142237c388fc8fa1f52eecd568af2af01695342b1d17c4fd4.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2008 48f6242537331f5142237c388fc8fa1f52eecd568af2af01695342b1d17c4fd4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\48f6242537331f5142237c388fc8fa1f52eecd568af2af01695342b1d17c4fd4.exe"C:\Users\Admin\AppData\Local\Temp\48f6242537331f5142237c388fc8fa1f52eecd568af2af01695342b1d17c4fd4.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2008