Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21/03/2023, 14:38
Behavioral task
behavioral1
Sample
d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe
Resource
win10v2004-20230220-en
General
-
Target
d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe
-
Size
3.4MB
-
MD5
780e2eb727a2a278795471059f4d6b33
-
SHA1
2911c5de51eaf1ae82e96fc26c1505cbfa7f0641
-
SHA256
d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824
-
SHA512
bf1748e47377290b9356d6ac5f42cfdc974117cc21e901d5443f71348930af37d6eaf3d8363464297454560396ea1d87cc5804b415d1fb8db01a5859ff3026ed
-
SSDEEP
98304:OWYHz9DAMmWXxVkYIs0xQIk5Zq7IvQEJ/lnvf0xSOS:KHz9MP1s0LkTqUvbhNvfdp
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe -
resource yara_rule behavioral1/memory/2036-54-0x00000000002C0000-0x0000000000AA9000-memory.dmp themida behavioral1/memory/2036-55-0x00000000002C0000-0x0000000000AA9000-memory.dmp themida behavioral1/memory/2036-56-0x00000000002C0000-0x0000000000AA9000-memory.dmp themida behavioral1/memory/2036-57-0x00000000002C0000-0x0000000000AA9000-memory.dmp themida behavioral1/memory/2036-58-0x00000000002C0000-0x0000000000AA9000-memory.dmp themida behavioral1/memory/2036-59-0x00000000002C0000-0x0000000000AA9000-memory.dmp themida behavioral1/memory/2036-60-0x00000000002C0000-0x0000000000AA9000-memory.dmp themida behavioral1/memory/2036-61-0x00000000002C0000-0x0000000000AA9000-memory.dmp themida behavioral1/memory/2036-65-0x00000000002C0000-0x0000000000AA9000-memory.dmp themida behavioral1/memory/2036-66-0x00000000002C0000-0x0000000000AA9000-memory.dmp themida behavioral1/memory/2036-67-0x00000000002C0000-0x0000000000AA9000-memory.dmp themida behavioral1/memory/2036-68-0x00000000002C0000-0x0000000000AA9000-memory.dmp themida behavioral1/memory/2036-69-0x00000000002C0000-0x0000000000AA9000-memory.dmp themida behavioral1/memory/2036-70-0x00000000002C0000-0x0000000000AA9000-memory.dmp themida behavioral1/memory/2036-71-0x00000000002C0000-0x0000000000AA9000-memory.dmp themida behavioral1/memory/2036-72-0x00000000002C0000-0x0000000000AA9000-memory.dmp themida behavioral1/memory/2036-73-0x00000000002C0000-0x0000000000AA9000-memory.dmp themida behavioral1/memory/2036-74-0x00000000002C0000-0x0000000000AA9000-memory.dmp themida behavioral1/memory/2036-75-0x00000000002C0000-0x0000000000AA9000-memory.dmp themida behavioral1/memory/2036-76-0x00000000002C0000-0x0000000000AA9000-memory.dmp themida behavioral1/memory/2036-77-0x00000000002C0000-0x0000000000AA9000-memory.dmp themida behavioral1/memory/2036-78-0x00000000002C0000-0x0000000000AA9000-memory.dmp themida behavioral1/memory/2036-79-0x00000000002C0000-0x0000000000AA9000-memory.dmp themida behavioral1/memory/2036-80-0x00000000002C0000-0x0000000000AA9000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\GOLVTL = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windata\\taskmgr.exe\"" d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe -
AutoIT Executable 23 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2036-55-0x00000000002C0000-0x0000000000AA9000-memory.dmp autoit_exe behavioral1/memory/2036-56-0x00000000002C0000-0x0000000000AA9000-memory.dmp autoit_exe behavioral1/memory/2036-57-0x00000000002C0000-0x0000000000AA9000-memory.dmp autoit_exe behavioral1/memory/2036-58-0x00000000002C0000-0x0000000000AA9000-memory.dmp autoit_exe behavioral1/memory/2036-59-0x00000000002C0000-0x0000000000AA9000-memory.dmp autoit_exe behavioral1/memory/2036-60-0x00000000002C0000-0x0000000000AA9000-memory.dmp autoit_exe behavioral1/memory/2036-61-0x00000000002C0000-0x0000000000AA9000-memory.dmp autoit_exe behavioral1/memory/2036-65-0x00000000002C0000-0x0000000000AA9000-memory.dmp autoit_exe behavioral1/memory/2036-66-0x00000000002C0000-0x0000000000AA9000-memory.dmp autoit_exe behavioral1/memory/2036-67-0x00000000002C0000-0x0000000000AA9000-memory.dmp autoit_exe behavioral1/memory/2036-68-0x00000000002C0000-0x0000000000AA9000-memory.dmp autoit_exe behavioral1/memory/2036-69-0x00000000002C0000-0x0000000000AA9000-memory.dmp autoit_exe behavioral1/memory/2036-70-0x00000000002C0000-0x0000000000AA9000-memory.dmp autoit_exe behavioral1/memory/2036-71-0x00000000002C0000-0x0000000000AA9000-memory.dmp autoit_exe behavioral1/memory/2036-72-0x00000000002C0000-0x0000000000AA9000-memory.dmp autoit_exe behavioral1/memory/2036-73-0x00000000002C0000-0x0000000000AA9000-memory.dmp autoit_exe behavioral1/memory/2036-74-0x00000000002C0000-0x0000000000AA9000-memory.dmp autoit_exe behavioral1/memory/2036-75-0x00000000002C0000-0x0000000000AA9000-memory.dmp autoit_exe behavioral1/memory/2036-76-0x00000000002C0000-0x0000000000AA9000-memory.dmp autoit_exe behavioral1/memory/2036-77-0x00000000002C0000-0x0000000000AA9000-memory.dmp autoit_exe behavioral1/memory/2036-78-0x00000000002C0000-0x0000000000AA9000-memory.dmp autoit_exe behavioral1/memory/2036-79-0x00000000002C0000-0x0000000000AA9000-memory.dmp autoit_exe behavioral1/memory/2036-80-0x00000000002C0000-0x0000000000AA9000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\root\SecurityCenter2 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 976 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 28 PID 2036 wrote to memory of 976 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 28 PID 2036 wrote to memory of 976 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 28 PID 2036 wrote to memory of 976 2036 d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe"C:\Users\Admin\AppData\Local\Temp\d5a0c28c1b0198033e57c75f95c921244071ce7e2eebec74e66f384627900824.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\WSCript.exeWSCript C:\Users\Admin\AppData\Local\Temp\GOLVTL.vbs2⤵PID:976
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
948B
MD5a8979a46bea01e4f49ae88e0d729dcf1
SHA10979caed1b16b7bc10715edada511b8bfb95ec4d
SHA2568af86d6e622edfc16d1aa189ba5792cfe1d9f62b7e8420be6d423a72774e5499
SHA51282c6f66cfec913995dddde7b81d2b065e02f5c8a1d7bfa947d38949c0efd6a74a149b0f31e4899821332c7e6c4ea23fa78caacae17b765202b946f86cf1d5c8b