Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 11:18
Static task
static1
Behavioral task
behavioral1
Sample
taskhostcl.exe
Resource
win7-20230220-en
General
-
Target
taskhostcl.exe
-
Size
3.8MB
-
MD5
1f175c2b390c4a969e20ee55b9717cb0
-
SHA1
597a0d6feab62c7bff88b2321e3816ab4dc447bb
-
SHA256
e7726f656b2c499257541c6f77f80da3dbc68761a0c86b39c59b292a99800413
-
SHA512
6f2f07026669d27737cdada05e36a048502a7d624040a18cc3e8c8021143589f456422a5c4f8d2dba72ccba65e3dc119f52ed4741ddf24121c8a3d7799de19e4
-
SSDEEP
98304:3A/QAh25W+xsqp/ObAHj7gkHRHz2XI9rG7rBHyqBcp0:khGpxfNObADUkHRHqcSrNBcW
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
f52a5c9bc5eb2f51b22f04f3e85c301ac0170a650de6044773f0a8309fbdfb79
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhostcl.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhostcl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhostcl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe -
Executes dropped EXE 1 IoCs
pid Process 1816 ntlhost.exe -
Loads dropped DLL 1 IoCs
pid Process 1256 taskhostcl.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" taskhostcl.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostcl.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1256 taskhostcl.exe 1816 ntlhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1256 wrote to memory of 1816 1256 taskhostcl.exe 28 PID 1256 wrote to memory of 1816 1256 taskhostcl.exe 28 PID 1256 wrote to memory of 1816 1256 taskhostcl.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\taskhostcl.exe"C:\Users\Admin\AppData\Local\Temp\taskhostcl.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1816
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
810.8MB
MD5a1661d106b461ff4959d837cbda49f65
SHA1888e00776c1937849204a1865d510c05bc426b22
SHA25692062fcc13e43949951ecd543959eea2a52289fe4c77dd461cd527f82a49f809
SHA512ddc877e201543a5afa8a8a7adde94b5d822b72d55fb9dadb89207b7f03219cd27640997bebe2bbc74ac88155c206edc1389434a43a6c2cf04e6e82a4036d0cf9
-
Filesize
810.8MB
MD5a1661d106b461ff4959d837cbda49f65
SHA1888e00776c1937849204a1865d510c05bc426b22
SHA25692062fcc13e43949951ecd543959eea2a52289fe4c77dd461cd527f82a49f809
SHA512ddc877e201543a5afa8a8a7adde94b5d822b72d55fb9dadb89207b7f03219cd27640997bebe2bbc74ac88155c206edc1389434a43a6c2cf04e6e82a4036d0cf9