Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2023, 21:10

General

  • Target

    3c0fa6e38a695f6e2ada2a61953e2cdac12bf9b3de0d8f69a00698e0a8712be3.exe

  • Size

    3.4MB

  • MD5

    64dea14d6939fe9773c4fe7e9bb18bb0

  • SHA1

    61375e2f5e4b63030b74c6371d1925ac8a1b103d

  • SHA256

    3c0fa6e38a695f6e2ada2a61953e2cdac12bf9b3de0d8f69a00698e0a8712be3

  • SHA512

    094fef8016787cac91e58286b8adc4e95469563f391a6774d821caf7ef3a43d3ce3ad8ae028c435c18b289337667abf57ed7eb1f31be64fa89db085e0b138126

  • SSDEEP

    98304:+na5Gkonx+t5bHJmSwD2jCgQIr/84IVuTPYFw:4a5InxsjmTK+gQIjCw3

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Modifies file permissions 1 TTPs 3 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c0fa6e38a695f6e2ada2a61953e2cdac12bf9b3de0d8f69a00698e0a8712be3.exe
    "C:\Users\Admin\AppData\Local\Temp\3c0fa6e38a695f6e2ada2a61953e2cdac12bf9b3de0d8f69a00698e0a8712be3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2144
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\MicrosoftAdobe-type2.0.6.9" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:4296
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\MicrosoftAdobe-type2.0.6.9" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:4112
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\MicrosoftAdobe-type2.0.6.9" /inheritance:e /deny "admin:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:4608
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /CREATE /TN "MicrosoftAdobe-type2.0.6.9\MicrosoftAdobe-type2.0.6.9" /TR "C:\ProgramData\MicrosoftAdobe-type2.0.6.9\MicrosoftAdobe-type2.0.6.9.exe" /SC MINUTE
        3⤵
        • Creates scheduled task(s)
        PID:4772
      • C:\ProgramData\MicrosoftAdobe-type2.0.6.9\MicrosoftAdobe-type2.0.6.9.exe
        "C:\ProgramData\MicrosoftAdobe-type2.0.6.9\MicrosoftAdobe-type2.0.6.9.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        PID:3632
  • C:\ProgramData\MicrosoftAdobe-type2.0.6.9\MicrosoftAdobe-type2.0.6.9.exe
    C:\ProgramData\MicrosoftAdobe-type2.0.6.9\MicrosoftAdobe-type2.0.6.9.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Checks whether UAC is enabled
    PID:2012

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\MicrosoftAdobe-type2.0.6.9\MicrosoftAdobe-type2.0.6.9.exe

    Filesize

    830.1MB

    MD5

    93dac1dffb2c14fb9e21b77370d3e91e

    SHA1

    31fbb4ede42fbf6be5d014cb29aac2f9bcceb401

    SHA256

    26a655e36977b21a2cb445f00e0982f3bbea501856f6b864151516d3067c3dbc

    SHA512

    749f0442745a71458d7749f77574e3d1b1b062f2bc2505a184339dcd1a82263828732fb61c0eaaa021b0f69f2bfa7042f5863643f4211b254383de32ba2228f9

  • C:\ProgramData\MicrosoftAdobe-type2.0.6.9\MicrosoftAdobe-type2.0.6.9.exe

    Filesize

    830.1MB

    MD5

    93dac1dffb2c14fb9e21b77370d3e91e

    SHA1

    31fbb4ede42fbf6be5d014cb29aac2f9bcceb401

    SHA256

    26a655e36977b21a2cb445f00e0982f3bbea501856f6b864151516d3067c3dbc

    SHA512

    749f0442745a71458d7749f77574e3d1b1b062f2bc2505a184339dcd1a82263828732fb61c0eaaa021b0f69f2bfa7042f5863643f4211b254383de32ba2228f9

  • C:\ProgramData\MicrosoftAdobe-type2.0.6.9\MicrosoftAdobe-type2.0.6.9.exe

    Filesize

    166.9MB

    MD5

    089622867737b9f4f0c4bc31f05ba504

    SHA1

    6bfda1cf0c6b19c090a80173172cc1688f6dc021

    SHA256

    27e909d26b9933b39d5e9cd5f0e5842d6464349097c7787b1a087a6c90003d49

    SHA512

    e20a24a536f36a2cae077448079d004094109c063ffe770ab61d04f276057a99c638d096750db3258566f6a1667beab70bd4c0d0a062244941a509cb30568b9b

  • memory/2012-161-0x00007FF7DFAC0000-0x00007FF7DFFDF000-memory.dmp

    Filesize

    5.1MB

  • memory/2012-160-0x00007FF7DFAC0000-0x00007FF7DFFDF000-memory.dmp

    Filesize

    5.1MB

  • memory/2012-159-0x00007FF7DFAC0000-0x00007FF7DFFDF000-memory.dmp

    Filesize

    5.1MB

  • memory/2144-141-0x00000000057B0000-0x00000000057C0000-memory.dmp

    Filesize

    64KB

  • memory/2144-144-0x00000000057B0000-0x00000000057C0000-memory.dmp

    Filesize

    64KB

  • memory/2144-143-0x00000000057B0000-0x00000000057C0000-memory.dmp

    Filesize

    64KB

  • memory/2144-142-0x00000000057B0000-0x00000000057C0000-memory.dmp

    Filesize

    64KB

  • memory/2144-133-0x0000000000400000-0x000000000075C000-memory.dmp

    Filesize

    3.4MB

  • memory/2144-140-0x0000000005580000-0x000000000558A000-memory.dmp

    Filesize

    40KB

  • memory/2144-139-0x00000000055E0000-0x0000000005672000-memory.dmp

    Filesize

    584KB

  • memory/2144-138-0x0000000005B90000-0x0000000006134000-memory.dmp

    Filesize

    5.6MB

  • memory/3632-153-0x00007FF7DFAC0000-0x00007FF7DFFDF000-memory.dmp

    Filesize

    5.1MB

  • memory/3632-151-0x00007FF7DFAC0000-0x00007FF7DFFDF000-memory.dmp

    Filesize

    5.1MB

  • memory/3632-154-0x00007FF7DFAC0000-0x00007FF7DFFDF000-memory.dmp

    Filesize

    5.1MB

  • memory/3632-155-0x00007FF7DFAC0000-0x00007FF7DFFDF000-memory.dmp

    Filesize

    5.1MB

  • memory/3632-156-0x00007FF7DFAC0000-0x00007FF7DFFDF000-memory.dmp

    Filesize

    5.1MB