Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
179s -
max time network
236s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
09/02/2023, 09:04
Static task
static1
Behavioral task
behavioral1
Sample
00gif.dll
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
00gif.dll
Resource
win10v2004-20221111-en
4 signatures
150 seconds
General
-
Target
00gif.dll
-
Size
171KB
-
MD5
60827386e2d158fb3c2dff6ef19a6a3e
-
SHA1
7f687e70c319d419b91c85b4c8a027cae2876714
-
SHA256
4ad4b1410ed957d39985d24c613036f2b777dd2ed01a3ae7a9ab28e298f29ede
-
SHA512
a1a612af39d410ad6c5d17b016d8c0c9b4436203cc57616b436b18e40b715a4e80ab9b5419b4229b92a2a70e755a8eb41c8bda424fa503dc06ba5951f50a0bcc
-
SSDEEP
3072:8uZ6hcvJTZ9oVFBfnIyht8vPs1XQHBC92ePuH:dTN4HBnI2t8vPLu6
Score
9/10
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3876 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3060 PING.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4868 wrote to memory of 4948 4868 regsvr32.exe 78 PID 4868 wrote to memory of 4948 4868 regsvr32.exe 78 PID 4868 wrote to memory of 4948 4868 regsvr32.exe 78 PID 4948 wrote to memory of 3876 4948 regsvr32.exe 80 PID 4948 wrote to memory of 3876 4948 regsvr32.exe 80 PID 4948 wrote to memory of 3876 4948 regsvr32.exe 80 PID 4948 wrote to memory of 2148 4948 regsvr32.exe 83 PID 4948 wrote to memory of 2148 4948 regsvr32.exe 83 PID 4948 wrote to memory of 2148 4948 regsvr32.exe 83 PID 2148 wrote to memory of 3060 2148 cmd.exe 85 PID 2148 wrote to memory of 3060 2148 cmd.exe 85 PID 2148 wrote to memory of 3060 2148 cmd.exe 85
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\00gif.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\00gif.dll2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /F /TN "{8B30B3CD-2068-4F75-AB1F-FCAE6AF928B6}" /TR " cmd /q /c start /min \"\" powershell \"$nonresistantOutlivesDictatorial = Get-ItemProperty -Path HKCU:\Software\nonresistantOutlivesDictatorial; powershell -encodedcommand $nonresistantOutlivesDictatorial.AphroniaHaimavati \"" /SC MINUTE /MO 133⤵
- Creates scheduled task(s)
PID:3876
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C "ping localhost && DEL /F /S /Q /A "3⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\PING.EXEping localhost4⤵
- Runs ping.exe
PID:3060
-
-
-