Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2023, 17:18
Static task
static1
General
-
Target
3e8c5179ca686222a014f4d1f8803fc986292db01e83f9aae1a05d0c233e42c0.exe
-
Size
3.4MB
-
MD5
0fdd88a8bdbce3e666baa64eb8d3f93f
-
SHA1
1de9d8b10439a81f779c8dd0a99827253d1e6881
-
SHA256
3e8c5179ca686222a014f4d1f8803fc986292db01e83f9aae1a05d0c233e42c0
-
SHA512
5132a38bb097bc9ba01b59ffd06544ef11f1c0dcc75d94d62deac9c1f1cc4c03a2c5485006a11e9021b10ff9269e5490c80bcf3b1663093c1537b9bb2baa75cb
-
SSDEEP
98304:HB/hPovhl+YHt0DJSZtAzc/K9gMus7RfRwUIq8DuznQ6:HzQm6EJzxl7RJwk8DuznQ6
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ PackagesSoftwareDistribution-type8.3.8.1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ PackagesSoftwareDistribution-type8.3.8.1.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PackagesSoftwareDistribution-type8.3.8.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion PackagesSoftwareDistribution-type8.3.8.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PackagesSoftwareDistribution-type8.3.8.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion PackagesSoftwareDistribution-type8.3.8.1.exe -
Executes dropped EXE 2 IoCs
pid Process 1948 PackagesSoftwareDistribution-type8.3.8.1.exe 544 PackagesSoftwareDistribution-type8.3.8.1.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 1252 icacls.exe 4968 icacls.exe 4828 icacls.exe -
resource yara_rule behavioral1/files/0x0007000000023141-148.dat upx behavioral1/files/0x0007000000023141-151.dat upx behavioral1/files/0x0007000000023141-150.dat upx behavioral1/memory/1948-153-0x00007FF605980000-0x00007FF605E9F000-memory.dmp upx behavioral1/memory/1948-154-0x00007FF605980000-0x00007FF605E9F000-memory.dmp upx behavioral1/memory/1948-155-0x00007FF605980000-0x00007FF605E9F000-memory.dmp upx behavioral1/memory/1948-156-0x00007FF605980000-0x00007FF605E9F000-memory.dmp upx behavioral1/files/0x0007000000023141-157.dat upx behavioral1/memory/544-158-0x00007FF605980000-0x00007FF605E9F000-memory.dmp upx behavioral1/memory/544-159-0x00007FF605980000-0x00007FF605E9F000-memory.dmp upx behavioral1/memory/544-160-0x00007FF605980000-0x00007FF605E9F000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PackagesSoftwareDistribution-type8.3.8.1.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PackagesSoftwareDistribution-type8.3.8.1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4420 set thread context of 2888 4420 3e8c5179ca686222a014f4d1f8803fc986292db01e83f9aae1a05d0c233e42c0.exe 87 -
Program crash 1 IoCs
pid pid_target Process procid_target 2924 4420 WerFault.exe 85 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1692 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4420 wrote to memory of 2888 4420 3e8c5179ca686222a014f4d1f8803fc986292db01e83f9aae1a05d0c233e42c0.exe 87 PID 4420 wrote to memory of 2888 4420 3e8c5179ca686222a014f4d1f8803fc986292db01e83f9aae1a05d0c233e42c0.exe 87 PID 4420 wrote to memory of 2888 4420 3e8c5179ca686222a014f4d1f8803fc986292db01e83f9aae1a05d0c233e42c0.exe 87 PID 4420 wrote to memory of 2888 4420 3e8c5179ca686222a014f4d1f8803fc986292db01e83f9aae1a05d0c233e42c0.exe 87 PID 4420 wrote to memory of 2888 4420 3e8c5179ca686222a014f4d1f8803fc986292db01e83f9aae1a05d0c233e42c0.exe 87 PID 2888 wrote to memory of 1252 2888 AppLaunch.exe 96 PID 2888 wrote to memory of 1252 2888 AppLaunch.exe 96 PID 2888 wrote to memory of 1252 2888 AppLaunch.exe 96 PID 2888 wrote to memory of 4968 2888 AppLaunch.exe 98 PID 2888 wrote to memory of 4968 2888 AppLaunch.exe 98 PID 2888 wrote to memory of 4968 2888 AppLaunch.exe 98 PID 2888 wrote to memory of 4828 2888 AppLaunch.exe 99 PID 2888 wrote to memory of 4828 2888 AppLaunch.exe 99 PID 2888 wrote to memory of 4828 2888 AppLaunch.exe 99 PID 2888 wrote to memory of 1692 2888 AppLaunch.exe 102 PID 2888 wrote to memory of 1692 2888 AppLaunch.exe 102 PID 2888 wrote to memory of 1692 2888 AppLaunch.exe 102 PID 2888 wrote to memory of 1948 2888 AppLaunch.exe 104 PID 2888 wrote to memory of 1948 2888 AppLaunch.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e8c5179ca686222a014f4d1f8803fc986292db01e83f9aae1a05d0c233e42c0.exe"C:\Users\Admin\AppData\Local\Temp\3e8c5179ca686222a014f4d1f8803fc986292db01e83f9aae1a05d0c233e42c0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\PackagesSoftwareDistribution-type8.3.8.1" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:1252
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\PackagesSoftwareDistribution-type8.3.8.1" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4968
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\PackagesSoftwareDistribution-type8.3.8.1" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4828
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "PackagesSoftwareDistribution-type8.3.8.1\PackagesSoftwareDistribution-type8.3.8.1" /TR "C:\ProgramData\PackagesSoftwareDistribution-type8.3.8.1\PackagesSoftwareDistribution-type8.3.8.1.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:1692
-
-
C:\ProgramData\PackagesSoftwareDistribution-type8.3.8.1\PackagesSoftwareDistribution-type8.3.8.1.exe"C:\ProgramData\PackagesSoftwareDistribution-type8.3.8.1\PackagesSoftwareDistribution-type8.3.8.1.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:1948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 2762⤵
- Program crash
PID:2924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4420 -ip 44201⤵PID:2284
-
C:\ProgramData\PackagesSoftwareDistribution-type8.3.8.1\PackagesSoftwareDistribution-type8.3.8.1.exeC:\ProgramData\PackagesSoftwareDistribution-type8.3.8.1\PackagesSoftwareDistribution-type8.3.8.1.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:544
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\PackagesSoftwareDistribution-type8.3.8.1\PackagesSoftwareDistribution-type8.3.8.1.exe
Filesize533.4MB
MD5c0e77467b6b0e6ee935bf6d68d918c94
SHA14cbedcb14c82ef7fbaeb9403678b8a1d72c4e4b9
SHA256a8da329b9b660b0952522e1978600c24b39876b20c1ee0460f98999766302fca
SHA51203e8b480fe1a78cf297ec42a71e98369c24a8aa17913acabba16cfba7cc987852230e1362433d496fe1bace65d3971fcdaf421c5a00f43b02b1d0d83c09f1267
-
C:\ProgramData\PackagesSoftwareDistribution-type8.3.8.1\PackagesSoftwareDistribution-type8.3.8.1.exe
Filesize488.8MB
MD5223b8a8fec7982be5e65a47d351023bb
SHA1f3c4589ac27271e83d41fac68f27ec0e5300e2d9
SHA25638c1a5765be8f79b81bd758a015d9661f83708069a0aa8a686f55861168f57d8
SHA5126505afbc9924e58f27427604463cd8718d6f6ef55e201ebb71093137191e2a23735d1933e8dd7d022888c220f40997365f4aeed5c944c383f310c67432a9895e
-
C:\ProgramData\PackagesSoftwareDistribution-type8.3.8.1\PackagesSoftwareDistribution-type8.3.8.1.exe
Filesize499.2MB
MD5ec84d2d9e6d7d5dd17d16d82731e24b1
SHA100560d0f405992e60a74e584e349a7be40acaf34
SHA2560435b4c009178d8cf8005d56a208ac3df00ef784c38c429187dcef8d0d8e491c
SHA51240937882919faf6ac3bda69bbf10f8d92b7c3b884ab801928ded83a3b1c8e2589994a137645eb66fe152f947da30611325219647f22674cfcc820b27b61e2597
-
C:\ProgramData\PackagesSoftwareDistribution-type8.3.8.1\PackagesSoftwareDistribution-type8.3.8.1.exe
Filesize347.0MB
MD5b3cd4eb7178f423413b83d1d01916595
SHA173a4f5714475bc2eaf3e44d25c65aacbaa4ee421
SHA25675d635bfea866b445cb9dbac006fccaf1a9f2b6a6626ae742fb61ff63d789673
SHA512ed3d57a974eb3b416f4860f01a34656874a61cc366c7890687f2c616727ea8ecc72b4f6d8db92aae9ffec6a4202cf1d39caba3dce31e9a435d41bd6ff0ed6fe1