Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2023, 20:42
Static task
static1
General
-
Target
3ac05c5c36b18ea0ec1070096f55534ecebd2585d37e423594c10c5cda1fda96.exe
-
Size
3.4MB
-
MD5
cf0aefcd52645b6769a942afac9af1c3
-
SHA1
cc5ce79ee910b1f4993dba0cda23dfd2c4488264
-
SHA256
3ac05c5c36b18ea0ec1070096f55534ecebd2585d37e423594c10c5cda1fda96
-
SHA512
f37e495dfeab55078a366352c733c4488e3fc727e83a1689aa6458206cae8eabc0dd54966fbf24735bffda86836e1858841173e7d78ac9575295dadcc74cca24
-
SSDEEP
98304:Mna5Gkonx+t5bHJmSwD2jCgQIr/84IVuTPYFw:ea5InxsjmTK+gQIjCw3
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DesktopAdobe-type1.0.1.2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DesktopAdobe-type1.0.1.2.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DesktopAdobe-type1.0.1.2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DesktopAdobe-type1.0.1.2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DesktopAdobe-type1.0.1.2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DesktopAdobe-type1.0.1.2.exe -
Executes dropped EXE 2 IoCs
pid Process 3188 DesktopAdobe-type1.0.1.2.exe 3848 DesktopAdobe-type1.0.1.2.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 4636 icacls.exe 4004 icacls.exe 2652 icacls.exe -
resource yara_rule behavioral1/files/0x000600000002314a-149.dat upx behavioral1/files/0x000600000002314a-150.dat upx behavioral1/files/0x000600000002314a-151.dat upx behavioral1/memory/3188-152-0x00007FF760E80000-0x00007FF76139F000-memory.dmp upx behavioral1/memory/3188-154-0x00007FF760E80000-0x00007FF76139F000-memory.dmp upx behavioral1/memory/3188-155-0x00007FF760E80000-0x00007FF76139F000-memory.dmp upx behavioral1/memory/3188-156-0x00007FF760E80000-0x00007FF76139F000-memory.dmp upx behavioral1/files/0x000600000002314a-157.dat upx behavioral1/memory/3848-159-0x00007FF760E80000-0x00007FF76139F000-memory.dmp upx behavioral1/memory/3848-158-0x00007FF760E80000-0x00007FF76139F000-memory.dmp upx behavioral1/memory/3848-160-0x00007FF760E80000-0x00007FF76139F000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DesktopAdobe-type1.0.1.2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DesktopAdobe-type1.0.1.2.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3376 set thread context of 2152 3376 3ac05c5c36b18ea0ec1070096f55534ecebd2585d37e423594c10c5cda1fda96.exe 87 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1440 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3376 wrote to memory of 2152 3376 3ac05c5c36b18ea0ec1070096f55534ecebd2585d37e423594c10c5cda1fda96.exe 87 PID 3376 wrote to memory of 2152 3376 3ac05c5c36b18ea0ec1070096f55534ecebd2585d37e423594c10c5cda1fda96.exe 87 PID 3376 wrote to memory of 2152 3376 3ac05c5c36b18ea0ec1070096f55534ecebd2585d37e423594c10c5cda1fda96.exe 87 PID 3376 wrote to memory of 2152 3376 3ac05c5c36b18ea0ec1070096f55534ecebd2585d37e423594c10c5cda1fda96.exe 87 PID 3376 wrote to memory of 2152 3376 3ac05c5c36b18ea0ec1070096f55534ecebd2585d37e423594c10c5cda1fda96.exe 87 PID 2152 wrote to memory of 2652 2152 AppLaunch.exe 94 PID 2152 wrote to memory of 2652 2152 AppLaunch.exe 94 PID 2152 wrote to memory of 2652 2152 AppLaunch.exe 94 PID 2152 wrote to memory of 4636 2152 AppLaunch.exe 96 PID 2152 wrote to memory of 4636 2152 AppLaunch.exe 96 PID 2152 wrote to memory of 4636 2152 AppLaunch.exe 96 PID 2152 wrote to memory of 4004 2152 AppLaunch.exe 98 PID 2152 wrote to memory of 4004 2152 AppLaunch.exe 98 PID 2152 wrote to memory of 4004 2152 AppLaunch.exe 98 PID 2152 wrote to memory of 1440 2152 AppLaunch.exe 100 PID 2152 wrote to memory of 1440 2152 AppLaunch.exe 100 PID 2152 wrote to memory of 1440 2152 AppLaunch.exe 100 PID 2152 wrote to memory of 3188 2152 AppLaunch.exe 102 PID 2152 wrote to memory of 3188 2152 AppLaunch.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ac05c5c36b18ea0ec1070096f55534ecebd2585d37e423594c10c5cda1fda96.exe"C:\Users\Admin\AppData\Local\Temp\3ac05c5c36b18ea0ec1070096f55534ecebd2585d37e423594c10c5cda1fda96.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\DesktopAdobe-type1.0.1.2" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:2652
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\DesktopAdobe-type1.0.1.2" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4636
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\DesktopAdobe-type1.0.1.2" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4004
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "DesktopAdobe-type1.0.1.2\DesktopAdobe-type1.0.1.2" /TR "C:\ProgramData\DesktopAdobe-type1.0.1.2\DesktopAdobe-type1.0.1.2.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:1440
-
-
C:\ProgramData\DesktopAdobe-type1.0.1.2\DesktopAdobe-type1.0.1.2.exe"C:\ProgramData\DesktopAdobe-type1.0.1.2\DesktopAdobe-type1.0.1.2.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3188
-
-
-
C:\ProgramData\DesktopAdobe-type1.0.1.2\DesktopAdobe-type1.0.1.2.exeC:\ProgramData\DesktopAdobe-type1.0.1.2\DesktopAdobe-type1.0.1.2.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3848
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
500.7MB
MD5c4bdf40d99677a1adb4804e908aee747
SHA187751b7645ce719a73cafcfa6f9873cbc34632fb
SHA2566f153d1f5f09916483a623ca8811e1705c89892c2815fe38ae0ccc77d6492243
SHA512e4b89acb8cbe9646d3047dee9a99237d873bfbcec36ed91725770a6726597a480a2f44f827f56f76f373fcd3916eca07e6ddc3da42313fa2d606315d30d8fd1a
-
Filesize
548.5MB
MD57948b1d6733851edd4c67b64fee0a03e
SHA1c927518fb8cf303fdf16593a58015b0caccf5306
SHA25635f78bcfa10b2268d8e81dd9d5572eed97c8a96607e2677099b7a0439ec35d19
SHA51218c5edd61ab1448c8fd0518db3d68b637003367a94df16289d2ee8075990a932d5fc02c8a75b31232d73606f4c6f07dec77f18daa34e63197a4802493ebed754
-
Filesize
511.4MB
MD5332c6ec347ac8a2b72d5621bcffa7587
SHA105f9d820a2bb30493159bb03e8a93a73235d67db
SHA256fbc1b654ecadec1115821ea9a5138081f4260341fdbb6da8d3edb99fcf2dafa0
SHA51227e6a44ee8068a062c445e91b3098183978ace9696b65b1da6601f490cbfa5d9dfd276f5e411ee6f7668c24b9f8bedecffac14be6bf45bc19c8ddd96b6b9c19e
-
Filesize
334.9MB
MD54be4600f4328bf2381e5f6b6e39b10cc
SHA1cbc76c948406b96deb26913d4acfd0e66f4ba995
SHA2569bfceebf7a32e94774026102eb4995da4bad0dbd46c2ba147e1d054f3aa577e3
SHA5120335e5355469f51869481ea8e9bf7402bfa9a99b07a3cd8fdc3dd2ac0250b6831aee3d8384dcf3773ae37fa578e0ebcb6fd74db97e7ae904fea9e9a2dabd3980