Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/03/2023, 17:18

General

  • Target

    3e8c5179ca686222a014f4d1f8803fc986292db01e83f9aae1a05d0c233e42c0.exe

  • Size

    3.4MB

  • MD5

    0fdd88a8bdbce3e666baa64eb8d3f93f

  • SHA1

    1de9d8b10439a81f779c8dd0a99827253d1e6881

  • SHA256

    3e8c5179ca686222a014f4d1f8803fc986292db01e83f9aae1a05d0c233e42c0

  • SHA512

    5132a38bb097bc9ba01b59ffd06544ef11f1c0dcc75d94d62deac9c1f1cc4c03a2c5485006a11e9021b10ff9269e5490c80bcf3b1663093c1537b9bb2baa75cb

  • SSDEEP

    98304:HB/hPovhl+YHt0DJSZtAzc/K9gMus7RfRwUIq8DuznQ6:HzQm6EJzxl7RJwk8DuznQ6

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Modifies file permissions 1 TTPs 3 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e8c5179ca686222a014f4d1f8803fc986292db01e83f9aae1a05d0c233e42c0.exe
    "C:\Users\Admin\AppData\Local\Temp\3e8c5179ca686222a014f4d1f8803fc986292db01e83f9aae1a05d0c233e42c0.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4420
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2888
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\PackagesSoftwareDistribution-type8.3.8.1" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:1252
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\PackagesSoftwareDistribution-type8.3.8.1" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:4968
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\PackagesSoftwareDistribution-type8.3.8.1" /inheritance:e /deny "admin:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:4828
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /CREATE /TN "PackagesSoftwareDistribution-type8.3.8.1\PackagesSoftwareDistribution-type8.3.8.1" /TR "C:\ProgramData\PackagesSoftwareDistribution-type8.3.8.1\PackagesSoftwareDistribution-type8.3.8.1.exe" /SC MINUTE
        3⤵
        • Creates scheduled task(s)
        PID:1692
      • C:\ProgramData\PackagesSoftwareDistribution-type8.3.8.1\PackagesSoftwareDistribution-type8.3.8.1.exe
        "C:\ProgramData\PackagesSoftwareDistribution-type8.3.8.1\PackagesSoftwareDistribution-type8.3.8.1.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        PID:1948
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 276
      2⤵
      • Program crash
      PID:2924
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4420 -ip 4420
    1⤵
      PID:2284
    • C:\ProgramData\PackagesSoftwareDistribution-type8.3.8.1\PackagesSoftwareDistribution-type8.3.8.1.exe
      C:\ProgramData\PackagesSoftwareDistribution-type8.3.8.1\PackagesSoftwareDistribution-type8.3.8.1.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      PID:544

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\PackagesSoftwareDistribution-type8.3.8.1\PackagesSoftwareDistribution-type8.3.8.1.exe

      Filesize

      533.4MB

      MD5

      c0e77467b6b0e6ee935bf6d68d918c94

      SHA1

      4cbedcb14c82ef7fbaeb9403678b8a1d72c4e4b9

      SHA256

      a8da329b9b660b0952522e1978600c24b39876b20c1ee0460f98999766302fca

      SHA512

      03e8b480fe1a78cf297ec42a71e98369c24a8aa17913acabba16cfba7cc987852230e1362433d496fe1bace65d3971fcdaf421c5a00f43b02b1d0d83c09f1267

    • C:\ProgramData\PackagesSoftwareDistribution-type8.3.8.1\PackagesSoftwareDistribution-type8.3.8.1.exe

      Filesize

      488.8MB

      MD5

      223b8a8fec7982be5e65a47d351023bb

      SHA1

      f3c4589ac27271e83d41fac68f27ec0e5300e2d9

      SHA256

      38c1a5765be8f79b81bd758a015d9661f83708069a0aa8a686f55861168f57d8

      SHA512

      6505afbc9924e58f27427604463cd8718d6f6ef55e201ebb71093137191e2a23735d1933e8dd7d022888c220f40997365f4aeed5c944c383f310c67432a9895e

    • C:\ProgramData\PackagesSoftwareDistribution-type8.3.8.1\PackagesSoftwareDistribution-type8.3.8.1.exe

      Filesize

      499.2MB

      MD5

      ec84d2d9e6d7d5dd17d16d82731e24b1

      SHA1

      00560d0f405992e60a74e584e349a7be40acaf34

      SHA256

      0435b4c009178d8cf8005d56a208ac3df00ef784c38c429187dcef8d0d8e491c

      SHA512

      40937882919faf6ac3bda69bbf10f8d92b7c3b884ab801928ded83a3b1c8e2589994a137645eb66fe152f947da30611325219647f22674cfcc820b27b61e2597

    • C:\ProgramData\PackagesSoftwareDistribution-type8.3.8.1\PackagesSoftwareDistribution-type8.3.8.1.exe

      Filesize

      347.0MB

      MD5

      b3cd4eb7178f423413b83d1d01916595

      SHA1

      73a4f5714475bc2eaf3e44d25c65aacbaa4ee421

      SHA256

      75d635bfea866b445cb9dbac006fccaf1a9f2b6a6626ae742fb61ff63d789673

      SHA512

      ed3d57a974eb3b416f4860f01a34656874a61cc366c7890687f2c616727ea8ecc72b4f6d8db92aae9ffec6a4202cf1d39caba3dce31e9a435d41bd6ff0ed6fe1

    • memory/544-160-0x00007FF605980000-0x00007FF605E9F000-memory.dmp

      Filesize

      5.1MB

    • memory/544-159-0x00007FF605980000-0x00007FF605E9F000-memory.dmp

      Filesize

      5.1MB

    • memory/544-158-0x00007FF605980000-0x00007FF605E9F000-memory.dmp

      Filesize

      5.1MB

    • memory/1948-155-0x00007FF605980000-0x00007FF605E9F000-memory.dmp

      Filesize

      5.1MB

    • memory/1948-153-0x00007FF605980000-0x00007FF605E9F000-memory.dmp

      Filesize

      5.1MB

    • memory/1948-154-0x00007FF605980000-0x00007FF605E9F000-memory.dmp

      Filesize

      5.1MB

    • memory/1948-156-0x00007FF605980000-0x00007FF605E9F000-memory.dmp

      Filesize

      5.1MB

    • memory/2888-143-0x0000000005A50000-0x0000000005A60000-memory.dmp

      Filesize

      64KB

    • memory/2888-142-0x0000000005A50000-0x0000000005A60000-memory.dmp

      Filesize

      64KB

    • memory/2888-133-0x0000000000400000-0x000000000075C000-memory.dmp

      Filesize

      3.4MB

    • memory/2888-141-0x0000000005A50000-0x0000000005A60000-memory.dmp

      Filesize

      64KB

    • memory/2888-140-0x00000000057E0000-0x00000000057EA000-memory.dmp

      Filesize

      40KB

    • memory/2888-139-0x0000000005800000-0x0000000005892000-memory.dmp

      Filesize

      584KB

    • memory/2888-138-0x0000000005D10000-0x00000000062B4000-memory.dmp

      Filesize

      5.6MB