Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    03/05/2023, 01:16

General

  • Target

    2f090c38f238f2b1832d4d35ac187478.exe

  • Size

    14.3MB

  • MD5

    2f090c38f238f2b1832d4d35ac187478

  • SHA1

    cf4fd5e9a8901fa9a9a1341c37db867d00d250b2

  • SHA256

    01af533690ce972a69714876d3abc2f5c335b71a3de663b4a1523fdf2971c1c4

  • SHA512

    cd9dac1ba309b146d467996ba3683ea24844a4e254b91738c5e2e511e35da908787a0a4350e08f0a1e6ffaaec98696209343706645c1442c593d011f5fb18614

  • SSDEEP

    393216:zCcG29/suG6eV0ii36jf8ByQ/J3lZvt1ZfoWpBPsF:zZG2mmE0iYiEokJPZfohF

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 10 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Program crash 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f090c38f238f2b1832d4d35ac187478.exe
    "C:\Users\Admin\AppData\Local\Temp\2f090c38f238f2b1832d4d35ac187478.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -command Remove-Item 'C:\Users\Admin\AppData\Local\Temp\2f090c38f238f2b1832d4d35ac187478.exe.bak' -force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:900
    • C:\Windows\system32\net.exe
      net stop w32time
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1424
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 stop w32time
        3⤵
          PID:848
      • C:\Windows\system32\w32tm.exe
        w32tm /unregister
        2⤵
          PID:1648
        • C:\Windows\system32\w32tm.exe
          w32tm /register
          2⤵
          • Sets DLL path for service in the registry
          PID:924
        • C:\Windows\system32\net.exe
          net start w32time
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1092
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 start w32time
            3⤵
              PID:876
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "confirm-securebootuefi"
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1408
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell (GWMI Win32_Processor).VirtualizationFirmwareEnabled
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1344
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "$env:firmware_type"
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2036
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 836 -s 992
            2⤵
            • Program crash
            PID:1808

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

          Filesize

          7KB

          MD5

          c0eb13684ebaa8efed5b4ced4c11ad4a

          SHA1

          5c0390547695acdaac93cac2b57d204cf8fab440

          SHA256

          6827cfd60edd44e379e3d824de4ea76fc3fc6a1213b4f420e8dbd3f52e7b4071

          SHA512

          50c21ab770e3d3c3a777cd4aa1c5e463d40548e250628b92029bfd83b83be281f3f70a0d6d6a9fe623e2e0769570744820fed94bd4378f4e6131052e96f552de

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

          Filesize

          7KB

          MD5

          c0eb13684ebaa8efed5b4ced4c11ad4a

          SHA1

          5c0390547695acdaac93cac2b57d204cf8fab440

          SHA256

          6827cfd60edd44e379e3d824de4ea76fc3fc6a1213b4f420e8dbd3f52e7b4071

          SHA512

          50c21ab770e3d3c3a777cd4aa1c5e463d40548e250628b92029bfd83b83be281f3f70a0d6d6a9fe623e2e0769570744820fed94bd4378f4e6131052e96f552de

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

          Filesize

          7KB

          MD5

          c0eb13684ebaa8efed5b4ced4c11ad4a

          SHA1

          5c0390547695acdaac93cac2b57d204cf8fab440

          SHA256

          6827cfd60edd44e379e3d824de4ea76fc3fc6a1213b4f420e8dbd3f52e7b4071

          SHA512

          50c21ab770e3d3c3a777cd4aa1c5e463d40548e250628b92029bfd83b83be281f3f70a0d6d6a9fe623e2e0769570744820fed94bd4378f4e6131052e96f552de

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\W802HRLKDG1VT7RHKZ21.temp

          Filesize

          7KB

          MD5

          c0eb13684ebaa8efed5b4ced4c11ad4a

          SHA1

          5c0390547695acdaac93cac2b57d204cf8fab440

          SHA256

          6827cfd60edd44e379e3d824de4ea76fc3fc6a1213b4f420e8dbd3f52e7b4071

          SHA512

          50c21ab770e3d3c3a777cd4aa1c5e463d40548e250628b92029bfd83b83be281f3f70a0d6d6a9fe623e2e0769570744820fed94bd4378f4e6131052e96f552de

        • memory/836-62-0x000000013F380000-0x0000000141865000-memory.dmp

          Filesize

          36.9MB

        • memory/836-57-0x000000013F380000-0x0000000141865000-memory.dmp

          Filesize

          36.9MB

        • memory/836-61-0x000000013F380000-0x0000000141865000-memory.dmp

          Filesize

          36.9MB

        • memory/836-55-0x000000013F380000-0x0000000141865000-memory.dmp

          Filesize

          36.9MB

        • memory/836-109-0x000000013F380000-0x0000000141865000-memory.dmp

          Filesize

          36.9MB

        • memory/836-54-0x000000013F380000-0x0000000141865000-memory.dmp

          Filesize

          36.9MB

        • memory/836-56-0x000000013F380000-0x0000000141865000-memory.dmp

          Filesize

          36.9MB

        • memory/836-70-0x000000013F380000-0x0000000141865000-memory.dmp

          Filesize

          36.9MB

        • memory/836-59-0x000000013F380000-0x0000000141865000-memory.dmp

          Filesize

          36.9MB

        • memory/836-58-0x000000013F380000-0x0000000141865000-memory.dmp

          Filesize

          36.9MB

        • memory/836-84-0x000007FFFFF90000-0x000007FFFFFA0000-memory.dmp

          Filesize

          64KB

        • memory/900-68-0x000000001B130000-0x000000001B412000-memory.dmp

          Filesize

          2.9MB

        • memory/900-67-0x0000000002780000-0x0000000002800000-memory.dmp

          Filesize

          512KB

        • memory/900-71-0x0000000002780000-0x0000000002800000-memory.dmp

          Filesize

          512KB

        • memory/900-69-0x0000000002410000-0x0000000002418000-memory.dmp

          Filesize

          32KB

        • memory/900-73-0x0000000002780000-0x0000000002800000-memory.dmp

          Filesize

          512KB

        • memory/900-72-0x0000000002780000-0x0000000002800000-memory.dmp

          Filesize

          512KB

        • memory/1344-114-0x00000000028B0000-0x0000000002930000-memory.dmp

          Filesize

          512KB

        • memory/1344-113-0x00000000028B0000-0x0000000002930000-memory.dmp

          Filesize

          512KB

        • memory/1344-112-0x00000000028B0000-0x0000000002930000-memory.dmp

          Filesize

          512KB

        • memory/1408-111-0x000000000236B000-0x00000000023A2000-memory.dmp

          Filesize

          220KB

        • memory/1408-110-0x0000000002364000-0x0000000002367000-memory.dmp

          Filesize

          12KB

        • memory/1408-101-0x00000000023E0000-0x00000000023E8000-memory.dmp

          Filesize

          32KB

        • memory/2036-107-0x0000000002424000-0x0000000002427000-memory.dmp

          Filesize

          12KB

        • memory/2036-108-0x000000000242B000-0x0000000002462000-memory.dmp

          Filesize

          220KB

        • memory/2036-100-0x000000001B070000-0x000000001B352000-memory.dmp

          Filesize

          2.9MB