Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
31/01/2023, 08:50
Behavioral task
behavioral1
Sample
89559c4954df47871b4a9cebab8f2347.exe
Resource
win7-20221111-en
6 signatures
150 seconds
General
-
Target
89559c4954df47871b4a9cebab8f2347.exe
-
Size
15.1MB
-
MD5
89559c4954df47871b4a9cebab8f2347
-
SHA1
045966c65dc3a145a9dd437737e6206dd9869f0f
-
SHA256
a6270cc54b6be66c1f0e5288fc5cd2dcf3eba4a2c9c30db73fa2c6bc401413cd
-
SHA512
ed56c2a9a5e7098434fd9fd563cf4d905cb1fa46a1fb49f106292b06db892f38eba71f7b586d4eb227de6b151f8d5584c358f765e84b17f843492736a047d8c8
-
SSDEEP
393216:uhaZXBbufumA7BuRQ6rakWPcCfWE/qxlxvj59hnPYUr7Y:gIRAumBvraU6WXzj5bnXc
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 89559c4954df47871b4a9cebab8f2347.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 89559c4954df47871b4a9cebab8f2347.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 89559c4954df47871b4a9cebab8f2347.exe -
resource yara_rule behavioral1/memory/2004-54-0x000000013F6E0000-0x0000000141C8E000-memory.dmp themida behavioral1/memory/2004-56-0x000000013F6E0000-0x0000000141C8E000-memory.dmp themida behavioral1/memory/2004-55-0x000000013F6E0000-0x0000000141C8E000-memory.dmp themida behavioral1/memory/2004-58-0x000000013F6E0000-0x0000000141C8E000-memory.dmp themida behavioral1/memory/2004-59-0x000000013F6E0000-0x0000000141C8E000-memory.dmp themida behavioral1/memory/2004-60-0x000000013F6E0000-0x0000000141C8E000-memory.dmp themida behavioral1/memory/2004-61-0x000000013F6E0000-0x0000000141C8E000-memory.dmp themida behavioral1/memory/2004-63-0x000000013F6E0000-0x0000000141C8E000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 89559c4954df47871b4a9cebab8f2347.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2004 89559c4954df47871b4a9cebab8f2347.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2004 89559c4954df47871b4a9cebab8f2347.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\89559c4954df47871b4a9cebab8f2347.exe"C:\Users\Admin\AppData\Local\Temp\89559c4954df47871b4a9cebab8f2347.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2004