Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2023, 18:34
Static task
static1
General
-
Target
589f74dd5933296442d85eec9b0060a321ac8bd49569693134cf7d6c9864ea7f.exe
-
Size
3.5MB
-
MD5
f8d05ec22a180070e25d97e048c3cad6
-
SHA1
e675caa4e33775a22eac968befbafb8f81cd681b
-
SHA256
589f74dd5933296442d85eec9b0060a321ac8bd49569693134cf7d6c9864ea7f
-
SHA512
c559ad8ae219fac02cd61e1fbe2938697a0186f1de368b0aa572dff5386b46e73ca1b808266d034495a26a684ea214342dee466b6d09b3a317a0a8a38028e749
-
SSDEEP
49152:GICgYIBuLxcnsis7wVFEIRmQJcCT7KZLDMGLRwHyp9lcOP7UuziMddsruFXKQnLw:jYdxcnsEcI4QJhOOHyuM4u+UdJAqERL
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ AdobePackages-type0.4.4.1.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AdobePackages-type0.4.4.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AdobePackages-type0.4.4.1.exe -
Executes dropped EXE 1 IoCs
pid Process 1856 AdobePackages-type0.4.4.1.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 2280 icacls.exe 4032 icacls.exe 4704 icacls.exe -
resource yara_rule behavioral1/files/0x00050000000224de-149.dat upx behavioral1/files/0x00050000000224de-150.dat upx behavioral1/files/0x00050000000224de-151.dat upx behavioral1/memory/1856-152-0x00007FF7ACAF0000-0x00007FF7AD00F000-memory.dmp upx behavioral1/memory/1856-154-0x00007FF7ACAF0000-0x00007FF7AD00F000-memory.dmp upx behavioral1/memory/1856-156-0x00007FF7ACAF0000-0x00007FF7AD00F000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AdobePackages-type0.4.4.1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1352 set thread context of 1488 1352 589f74dd5933296442d85eec9b0060a321ac8bd49569693134cf7d6c9864ea7f.exe 85 -
Program crash 1 IoCs
pid pid_target Process procid_target 664 1352 WerFault.exe 83 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3508 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1352 wrote to memory of 1488 1352 589f74dd5933296442d85eec9b0060a321ac8bd49569693134cf7d6c9864ea7f.exe 85 PID 1352 wrote to memory of 1488 1352 589f74dd5933296442d85eec9b0060a321ac8bd49569693134cf7d6c9864ea7f.exe 85 PID 1352 wrote to memory of 1488 1352 589f74dd5933296442d85eec9b0060a321ac8bd49569693134cf7d6c9864ea7f.exe 85 PID 1352 wrote to memory of 1488 1352 589f74dd5933296442d85eec9b0060a321ac8bd49569693134cf7d6c9864ea7f.exe 85 PID 1352 wrote to memory of 1488 1352 589f74dd5933296442d85eec9b0060a321ac8bd49569693134cf7d6c9864ea7f.exe 85 PID 1488 wrote to memory of 2280 1488 AppLaunch.exe 90 PID 1488 wrote to memory of 2280 1488 AppLaunch.exe 90 PID 1488 wrote to memory of 2280 1488 AppLaunch.exe 90 PID 1488 wrote to memory of 4032 1488 AppLaunch.exe 92 PID 1488 wrote to memory of 4032 1488 AppLaunch.exe 92 PID 1488 wrote to memory of 4032 1488 AppLaunch.exe 92 PID 1488 wrote to memory of 4704 1488 AppLaunch.exe 94 PID 1488 wrote to memory of 4704 1488 AppLaunch.exe 94 PID 1488 wrote to memory of 4704 1488 AppLaunch.exe 94 PID 1488 wrote to memory of 3508 1488 AppLaunch.exe 96 PID 1488 wrote to memory of 3508 1488 AppLaunch.exe 96 PID 1488 wrote to memory of 3508 1488 AppLaunch.exe 96 PID 1488 wrote to memory of 1856 1488 AppLaunch.exe 99 PID 1488 wrote to memory of 1856 1488 AppLaunch.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\589f74dd5933296442d85eec9b0060a321ac8bd49569693134cf7d6c9864ea7f.exe"C:\Users\Admin\AppData\Local\Temp\589f74dd5933296442d85eec9b0060a321ac8bd49569693134cf7d6c9864ea7f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\AdobePackages-type0.4.4.1" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:2280
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\AdobePackages-type0.4.4.1" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4032
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\AdobePackages-type0.4.4.1" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4704
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "AdobePackages-type0.4.4.1\AdobePackages-type0.4.4.1" /TR "C:\ProgramData\AdobePackages-type0.4.4.1\AdobePackages-type0.4.4.1.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:3508
-
-
C:\ProgramData\AdobePackages-type0.4.4.1\AdobePackages-type0.4.4.1.exe"C:\ProgramData\AdobePackages-type0.4.4.1\AdobePackages-type0.4.4.1.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:1856
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 3402⤵
- Program crash
PID:664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1352 -ip 13521⤵PID:2800
-
C:\ProgramData\AdobePackages-type0.4.4.1\AdobePackages-type0.4.4.1.exeC:\ProgramData\AdobePackages-type0.4.4.1\AdobePackages-type0.4.4.1.exe1⤵PID:2740
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
770.1MB
MD5819bb3686a54c0b190cfc4020e3229a7
SHA104bf9058daa3841bf1106ba92c7e42d33436669a
SHA2569632ebd3f345c199b570240958c38bf6cec7f5cac08d3e8005481fbde27a293f
SHA51286ae5d4d2a4d1e90b3f98ce38c798df66f954c6bf7f4df9575c1178dd29b6108689d0757ac4dca54a0dfc6661e473f661062a5a8f011142668bf5399c7eec686
-
Filesize
807.5MB
MD51add02d63af99d97dda02de437f85913
SHA1e9b7e74b3222209ee281dc049b3967f9923d4781
SHA256c9c2a866659fa0404896c050f688e5e22747464c4e4ae3079cbfafcc9a23a351
SHA5126d363cfff4b9143afde28c4084ce1e994e373f618b0f127d863cc241ecf03ea89b3d6511efcc51e0215b1a37336f029e14955d284c05e1811e51af827e794bac
-
Filesize
327.0MB
MD5d73e5812ede87e11a65a4021095bc5a8
SHA1ea374692402f95070d0a1b0ba60dad409e7bc528
SHA2564efc621759c38458d4322ffb6e60c9f27885af9ae4e11294a604c77fa26af206
SHA512ee356f02bbe39a9a7e7ebf3c321936cac1577f564aa804def8753826d0876e63b8c4a352dcf517b67ea575890d561f25d418da4d493531e7efb258bedc691c55