Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2023, 21:10
Static task
static1
General
-
Target
3c0fa6e38a695f6e2ada2a61953e2cdac12bf9b3de0d8f69a00698e0a8712be3.exe
-
Size
3.4MB
-
MD5
64dea14d6939fe9773c4fe7e9bb18bb0
-
SHA1
61375e2f5e4b63030b74c6371d1925ac8a1b103d
-
SHA256
3c0fa6e38a695f6e2ada2a61953e2cdac12bf9b3de0d8f69a00698e0a8712be3
-
SHA512
094fef8016787cac91e58286b8adc4e95469563f391a6774d821caf7ef3a43d3ce3ad8ae028c435c18b289337667abf57ed7eb1f31be64fa89db085e0b138126
-
SSDEEP
98304:+na5Gkonx+t5bHJmSwD2jCgQIr/84IVuTPYFw:4a5InxsjmTK+gQIjCw3
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MicrosoftAdobe-type2.0.6.9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MicrosoftAdobe-type2.0.6.9.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MicrosoftAdobe-type2.0.6.9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MicrosoftAdobe-type2.0.6.9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MicrosoftAdobe-type2.0.6.9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MicrosoftAdobe-type2.0.6.9.exe -
Executes dropped EXE 2 IoCs
pid Process 3632 MicrosoftAdobe-type2.0.6.9.exe 2012 MicrosoftAdobe-type2.0.6.9.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 4296 icacls.exe 4112 icacls.exe 4608 icacls.exe -
resource yara_rule behavioral1/files/0x0006000000023138-148.dat upx behavioral1/files/0x0006000000023138-150.dat upx behavioral1/memory/3632-153-0x00007FF7DFAC0000-0x00007FF7DFFDF000-memory.dmp upx behavioral1/memory/3632-151-0x00007FF7DFAC0000-0x00007FF7DFFDF000-memory.dmp upx behavioral1/memory/3632-154-0x00007FF7DFAC0000-0x00007FF7DFFDF000-memory.dmp upx behavioral1/memory/3632-155-0x00007FF7DFAC0000-0x00007FF7DFFDF000-memory.dmp upx behavioral1/memory/3632-156-0x00007FF7DFAC0000-0x00007FF7DFFDF000-memory.dmp upx behavioral1/files/0x0006000000023138-158.dat upx behavioral1/memory/2012-159-0x00007FF7DFAC0000-0x00007FF7DFFDF000-memory.dmp upx behavioral1/memory/2012-160-0x00007FF7DFAC0000-0x00007FF7DFFDF000-memory.dmp upx behavioral1/memory/2012-161-0x00007FF7DFAC0000-0x00007FF7DFFDF000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MicrosoftAdobe-type2.0.6.9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MicrosoftAdobe-type2.0.6.9.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2120 set thread context of 2144 2120 3c0fa6e38a695f6e2ada2a61953e2cdac12bf9b3de0d8f69a00698e0a8712be3.exe 89 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4772 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2144 2120 3c0fa6e38a695f6e2ada2a61953e2cdac12bf9b3de0d8f69a00698e0a8712be3.exe 89 PID 2120 wrote to memory of 2144 2120 3c0fa6e38a695f6e2ada2a61953e2cdac12bf9b3de0d8f69a00698e0a8712be3.exe 89 PID 2120 wrote to memory of 2144 2120 3c0fa6e38a695f6e2ada2a61953e2cdac12bf9b3de0d8f69a00698e0a8712be3.exe 89 PID 2120 wrote to memory of 2144 2120 3c0fa6e38a695f6e2ada2a61953e2cdac12bf9b3de0d8f69a00698e0a8712be3.exe 89 PID 2120 wrote to memory of 2144 2120 3c0fa6e38a695f6e2ada2a61953e2cdac12bf9b3de0d8f69a00698e0a8712be3.exe 89 PID 2144 wrote to memory of 4296 2144 AppLaunch.exe 94 PID 2144 wrote to memory of 4296 2144 AppLaunch.exe 94 PID 2144 wrote to memory of 4296 2144 AppLaunch.exe 94 PID 2144 wrote to memory of 4112 2144 AppLaunch.exe 96 PID 2144 wrote to memory of 4112 2144 AppLaunch.exe 96 PID 2144 wrote to memory of 4112 2144 AppLaunch.exe 96 PID 2144 wrote to memory of 4608 2144 AppLaunch.exe 98 PID 2144 wrote to memory of 4608 2144 AppLaunch.exe 98 PID 2144 wrote to memory of 4608 2144 AppLaunch.exe 98 PID 2144 wrote to memory of 4772 2144 AppLaunch.exe 100 PID 2144 wrote to memory of 4772 2144 AppLaunch.exe 100 PID 2144 wrote to memory of 4772 2144 AppLaunch.exe 100 PID 2144 wrote to memory of 3632 2144 AppLaunch.exe 102 PID 2144 wrote to memory of 3632 2144 AppLaunch.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c0fa6e38a695f6e2ada2a61953e2cdac12bf9b3de0d8f69a00698e0a8712be3.exe"C:\Users\Admin\AppData\Local\Temp\3c0fa6e38a695f6e2ada2a61953e2cdac12bf9b3de0d8f69a00698e0a8712be3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\MicrosoftAdobe-type2.0.6.9" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4296
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\MicrosoftAdobe-type2.0.6.9" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4112
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\MicrosoftAdobe-type2.0.6.9" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4608
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "MicrosoftAdobe-type2.0.6.9\MicrosoftAdobe-type2.0.6.9" /TR "C:\ProgramData\MicrosoftAdobe-type2.0.6.9\MicrosoftAdobe-type2.0.6.9.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:4772
-
-
C:\ProgramData\MicrosoftAdobe-type2.0.6.9\MicrosoftAdobe-type2.0.6.9.exe"C:\ProgramData\MicrosoftAdobe-type2.0.6.9\MicrosoftAdobe-type2.0.6.9.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3632
-
-
-
C:\ProgramData\MicrosoftAdobe-type2.0.6.9\MicrosoftAdobe-type2.0.6.9.exeC:\ProgramData\MicrosoftAdobe-type2.0.6.9\MicrosoftAdobe-type2.0.6.9.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2012
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
830.1MB
MD593dac1dffb2c14fb9e21b77370d3e91e
SHA131fbb4ede42fbf6be5d014cb29aac2f9bcceb401
SHA25626a655e36977b21a2cb445f00e0982f3bbea501856f6b864151516d3067c3dbc
SHA512749f0442745a71458d7749f77574e3d1b1b062f2bc2505a184339dcd1a82263828732fb61c0eaaa021b0f69f2bfa7042f5863643f4211b254383de32ba2228f9
-
Filesize
830.1MB
MD593dac1dffb2c14fb9e21b77370d3e91e
SHA131fbb4ede42fbf6be5d014cb29aac2f9bcceb401
SHA25626a655e36977b21a2cb445f00e0982f3bbea501856f6b864151516d3067c3dbc
SHA512749f0442745a71458d7749f77574e3d1b1b062f2bc2505a184339dcd1a82263828732fb61c0eaaa021b0f69f2bfa7042f5863643f4211b254383de32ba2228f9
-
Filesize
166.9MB
MD5089622867737b9f4f0c4bc31f05ba504
SHA16bfda1cf0c6b19c090a80173172cc1688f6dc021
SHA25627e909d26b9933b39d5e9cd5f0e5842d6464349097c7787b1a087a6c90003d49
SHA512e20a24a536f36a2cae077448079d004094109c063ffe770ab61d04f276057a99c638d096750db3258566f6a1667beab70bd4c0d0a062244941a509cb30568b9b