Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2023, 11:52
Static task
static1
General
-
Target
849fc0c4496ba40a1c8662f54fc7f459cd6077f934e29077348b1c77fda09a4d.exe
-
Size
3.4MB
-
MD5
ff7c5f7d6900ad65f8870feb07b133d0
-
SHA1
ec27c8d7ae9f3963d2d42e80c060308aad887053
-
SHA256
849fc0c4496ba40a1c8662f54fc7f459cd6077f934e29077348b1c77fda09a4d
-
SHA512
ddfa352cd739f8f07cb657c5116a2664e6e54c363a3f7dba9e42a61c6207177f7f262d7a8fb3ad393f135bfdd3b892d39d3507ed0b9d64b62f482076245736f7
-
SSDEEP
98304:Zna5Gkonx+t5bHJmSwD2jCgQIr/84IVuTPY5:Za5InxsjmTK+gQIjCwg
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ AdobeDocuments-type4.8.8.6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ AdobeDocuments-type4.8.8.6.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AdobeDocuments-type4.8.8.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AdobeDocuments-type4.8.8.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AdobeDocuments-type4.8.8.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AdobeDocuments-type4.8.8.6.exe -
Executes dropped EXE 2 IoCs
pid Process 1088 AdobeDocuments-type4.8.8.6.exe 4308 AdobeDocuments-type4.8.8.6.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 3740 icacls.exe 3548 icacls.exe 908 icacls.exe -
resource yara_rule behavioral1/files/0x0009000000023182-149.dat upx behavioral1/files/0x0009000000023182-150.dat upx behavioral1/files/0x0009000000023182-151.dat upx behavioral1/memory/1088-153-0x00007FF656F20000-0x00007FF65743F000-memory.dmp upx behavioral1/memory/1088-154-0x00007FF656F20000-0x00007FF65743F000-memory.dmp upx behavioral1/memory/1088-155-0x00007FF656F20000-0x00007FF65743F000-memory.dmp upx behavioral1/memory/1088-156-0x00007FF656F20000-0x00007FF65743F000-memory.dmp upx behavioral1/memory/1088-158-0x00007FF656F20000-0x00007FF65743F000-memory.dmp upx behavioral1/memory/1088-157-0x00007FF656F20000-0x00007FF65743F000-memory.dmp upx behavioral1/memory/1088-159-0x00007FF656F20000-0x00007FF65743F000-memory.dmp upx behavioral1/files/0x0009000000023182-160.dat upx behavioral1/memory/4308-161-0x00007FF656F20000-0x00007FF65743F000-memory.dmp upx behavioral1/memory/4308-162-0x00007FF656F20000-0x00007FF65743F000-memory.dmp upx behavioral1/memory/4308-163-0x00007FF656F20000-0x00007FF65743F000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AdobeDocuments-type4.8.8.6.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AdobeDocuments-type4.8.8.6.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4604 set thread context of 2188 4604 849fc0c4496ba40a1c8662f54fc7f459cd6077f934e29077348b1c77fda09a4d.exe 88 -
Program crash 2 IoCs
pid pid_target Process procid_target 4668 4604 WerFault.exe 83 2312 4604 WerFault.exe 83 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3152 schtasks.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4604 wrote to memory of 2188 4604 849fc0c4496ba40a1c8662f54fc7f459cd6077f934e29077348b1c77fda09a4d.exe 88 PID 4604 wrote to memory of 2188 4604 849fc0c4496ba40a1c8662f54fc7f459cd6077f934e29077348b1c77fda09a4d.exe 88 PID 4604 wrote to memory of 2188 4604 849fc0c4496ba40a1c8662f54fc7f459cd6077f934e29077348b1c77fda09a4d.exe 88 PID 4604 wrote to memory of 2188 4604 849fc0c4496ba40a1c8662f54fc7f459cd6077f934e29077348b1c77fda09a4d.exe 88 PID 4604 wrote to memory of 2188 4604 849fc0c4496ba40a1c8662f54fc7f459cd6077f934e29077348b1c77fda09a4d.exe 88 PID 4604 wrote to memory of 4668 4604 849fc0c4496ba40a1c8662f54fc7f459cd6077f934e29077348b1c77fda09a4d.exe 93 PID 4604 wrote to memory of 4668 4604 849fc0c4496ba40a1c8662f54fc7f459cd6077f934e29077348b1c77fda09a4d.exe 93 PID 4604 wrote to memory of 4668 4604 849fc0c4496ba40a1c8662f54fc7f459cd6077f934e29077348b1c77fda09a4d.exe 93 PID 2188 wrote to memory of 3740 2188 AppLaunch.exe 97 PID 2188 wrote to memory of 3740 2188 AppLaunch.exe 97 PID 2188 wrote to memory of 3740 2188 AppLaunch.exe 97 PID 2188 wrote to memory of 908 2188 AppLaunch.exe 101 PID 2188 wrote to memory of 908 2188 AppLaunch.exe 101 PID 2188 wrote to memory of 908 2188 AppLaunch.exe 101 PID 2188 wrote to memory of 3548 2188 AppLaunch.exe 99 PID 2188 wrote to memory of 3548 2188 AppLaunch.exe 99 PID 2188 wrote to memory of 3548 2188 AppLaunch.exe 99 PID 2188 wrote to memory of 3152 2188 AppLaunch.exe 100 PID 2188 wrote to memory of 3152 2188 AppLaunch.exe 100 PID 2188 wrote to memory of 3152 2188 AppLaunch.exe 100 PID 2188 wrote to memory of 1088 2188 AppLaunch.exe 105 PID 2188 wrote to memory of 1088 2188 AppLaunch.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\849fc0c4496ba40a1c8662f54fc7f459cd6077f934e29077348b1c77fda09a4d.exe"C:\Users\Admin\AppData\Local\Temp\849fc0c4496ba40a1c8662f54fc7f459cd6077f934e29077348b1c77fda09a4d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\AdobeDocuments-type4.8.8.6" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:3740
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\AdobeDocuments-type4.8.8.6" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:3548
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "AdobeDocuments-type4.8.8.6\AdobeDocuments-type4.8.8.6" /TR "C:\ProgramData\AdobeDocuments-type4.8.8.6\AdobeDocuments-type4.8.8.6.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:3152
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\AdobeDocuments-type4.8.8.6" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:908
-
-
C:\ProgramData\AdobeDocuments-type4.8.8.6\AdobeDocuments-type4.8.8.6.exe"C:\ProgramData\AdobeDocuments-type4.8.8.6\AdobeDocuments-type4.8.8.6.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:1088
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 140364962⤵
- Program crash
PID:4668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 140364962⤵
- Program crash
PID:2312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4604 -ip 46041⤵PID:1208
-
C:\ProgramData\AdobeDocuments-type4.8.8.6\AdobeDocuments-type4.8.8.6.exeC:\ProgramData\AdobeDocuments-type4.8.8.6\AdobeDocuments-type4.8.8.6.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
461.0MB
MD5ad5dc8e10637cfe6706a8a61925589e5
SHA18d7684d336b1a1aa3c0474d1665657d8a094999c
SHA25604942275938f685b5070aaba8d7a8da9c64425d44f945bb609c7c14233167943
SHA5125a4424a3bcdda1518536f378cbec5e3a5d3e419cf8089ba0940e790befcded5f23499d96b436be03f0feacd81f4a046968d67aaf1924576f5d713fec73dab7c1
-
Filesize
455.2MB
MD5ef7a7d30b8868957640c95b33ef9621d
SHA19bf347a49f8b7277b88a27c431d1201fa0f4dbbc
SHA256c2af56958ceb4e4754df799da5308cfad4683e84beb82da98e45cb1c8168fe5b
SHA512a132e92998a06c1e3e437a83aed119104d05825e373ff0583b64244692af1df1baa9cb4ab772ad27610bce2001f747fe60fda9def67058e1f1ac27e15ae8538b
-
Filesize
423.0MB
MD5a6ff43c40d01467a2f648b03f2f9a668
SHA1cf2601ee12edd574dcad60a3600796fafe1ea7e4
SHA256371cd864ac59a26c0b716316287b86ab5b95b99c56facbffe8fe4d373234e155
SHA512028410ef373c2b391175a5d726593c76b6917d08013e767329e3c6502aa4d734a834392d647255716650f8a3ae52efac4a01d0fec69e818073ae34cf414bb514
-
Filesize
321.6MB
MD5dc2aa6fe7ba630c4f8816a99b3df4b17
SHA12ffa3818003bab83b1674901d839bed4412f8609
SHA256dc9a2ec723ec8436446bd38f11c978db29c2674fe11bbf3fac9ddd03a411d83e
SHA5127b7bdd286fcb7bf6d319ccf1a6adc09243bbb138660c93b3a588da0d837f06edb4ccba264d0aa406f613ad8809f80316743e2230759cf7c2c81b076d6655b256