Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
78s -
max time network
68s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/02/2023, 14:28
Static task
static1
Behavioral task
behavioral1
Sample
CV.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
CV.exe
Resource
win10v2004-20220812-en
General
-
Target
CV.exe
-
Size
738KB
-
MD5
8299775dc88e42710d2e8090142189f2
-
SHA1
ed5161f8636f6c99dadcebed389a8dae7d28f2ca
-
SHA256
6f1961dcfaced54164a7a91935ef591688c686ee9b4b6c091a02b8a3ee3778da
-
SHA512
847937a505fcf3a7172a65270055e6ad2833b6506e7e4408c3b8b108d6c0e7fac5b18ec3bf683e5f42190a4ed5278922d26b8998637aedc943e0a5a727765d34
-
SSDEEP
12288:itz8L6gu+xMRSR5S+bmF7YKqka8ARo7zDPQx/+KyDTl5K8IaFqG4yPa:jLzyRU5XCXa3IzzQUKyDX3IaFqG4yPa
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions CV.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools CV.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CV.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CV.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CV.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CV.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CV.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CV.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CV.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2008 set thread context of 968 2008 CV.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1608 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 592 powershell.exe 1308 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 968 CV.exe Token: SeDebugPrivilege 592 powershell.exe Token: SeDebugPrivilege 1308 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1308 2008 CV.exe 27 PID 2008 wrote to memory of 1308 2008 CV.exe 27 PID 2008 wrote to memory of 1308 2008 CV.exe 27 PID 2008 wrote to memory of 1308 2008 CV.exe 27 PID 2008 wrote to memory of 592 2008 CV.exe 30 PID 2008 wrote to memory of 592 2008 CV.exe 30 PID 2008 wrote to memory of 592 2008 CV.exe 30 PID 2008 wrote to memory of 592 2008 CV.exe 30 PID 2008 wrote to memory of 1608 2008 CV.exe 32 PID 2008 wrote to memory of 1608 2008 CV.exe 32 PID 2008 wrote to memory of 1608 2008 CV.exe 32 PID 2008 wrote to memory of 1608 2008 CV.exe 32 PID 2008 wrote to memory of 968 2008 CV.exe 34 PID 2008 wrote to memory of 968 2008 CV.exe 34 PID 2008 wrote to memory of 968 2008 CV.exe 34 PID 2008 wrote to memory of 968 2008 CV.exe 34 PID 2008 wrote to memory of 968 2008 CV.exe 34 PID 2008 wrote to memory of 968 2008 CV.exe 34 PID 2008 wrote to memory of 968 2008 CV.exe 34 PID 2008 wrote to memory of 968 2008 CV.exe 34 PID 2008 wrote to memory of 968 2008 CV.exe 34 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CV.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CV.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CV.exe"C:\Users\Admin\AppData\Local\Temp\CV.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\CV.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\XYZJuluV.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:592
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XYZJuluV" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAB4E.tmp"2⤵
- Creates scheduled task(s)
PID:1608
-
-
C:\Users\Admin\AppData\Local\Temp\CV.exe"C:\Users\Admin\AppData\Local\Temp\CV.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:968
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54562f52be022fae5a1c10ae958b112cb
SHA1a264feb4b1d2498b3ff9412615340ab77d94940d
SHA256810ce906de432873d1d95bab42c45861e965707389b4ae1a7e213bf3bcf1033f
SHA51263e7fba7a35ca56932733d6ac12053006b22e7683eaeb71d6daebe05019a013bfe66fbb712f1970dee0323e93d47cba4a7db374d3f275f24e37148ece0016c4e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5c2eb8618a00d8a8af8cbda94c3995ab6
SHA169b232ba29ddfcb5faf1fadb61856c864a32f5e5
SHA256198d9fdca911c54fdab95fd55f2e5603ede3a03c6bab5da392aa51b67e4e697d
SHA512356b79a1fa431d6d00448cf319fb1a84355a5f765089af34e3a45a33003c33eeab7e14993935db1d70402afbdc8b614b4edce83a4c774bbfe0e6ca9a62f57d5d