Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08/06/2023, 09:05
Static task
static1
Behavioral task
behavioral1
Sample
Electron/Electron.exe
Resource
win7-20230220-en
General
-
Target
Electron/Electron.exe
-
Size
4.1MB
-
MD5
9dd5ee5f8f58e4205ebe25ca7a356219
-
SHA1
7365b4096294b791b173803ddfd768186521793f
-
SHA256
46797e761cfacad8b3b3fddf4990b0b55f87a0ab76b8d949818ff7904744e0eb
-
SHA512
b38724047946ec37605beeacb165de185e8e360682ccda28351033ab7ee13408165791f2030469b98347dad038b9ff776c6392ffd57526a8c120272012513a1c
-
SSDEEP
98304:YEc1bNmfyMj4guXdLdiXx+Rton9QTj53C8f93S8b+m9axAm:YhNmaMj4gCwxwton0jNeGmA
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Electron.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Electron.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Electron.exe -
Loads dropped DLL 2 IoCs
pid Process 2012 Electron.exe 2012 Electron.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Electron.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2012 Electron.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 884 2012 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2012 Electron.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 812 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 812 AUDIODG.EXE Token: 33 812 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 812 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 884 2012 Electron.exe 32 PID 2012 wrote to memory of 884 2012 Electron.exe 32 PID 2012 wrote to memory of 884 2012 Electron.exe 32 PID 2012 wrote to memory of 884 2012 Electron.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Electron\Electron.exe"C:\Users\Admin\AppData\Local\Temp\Electron\Electron.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 27122⤵
- Program crash
PID:884
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1972
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:812
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
418KB
MD5f342d254fdd33e76b2fd6a3f8b517de3
SHA179c91621ea96a6635e3934e9b46dcf23d1fc762e
SHA2568ccde337ed97230a54e20db8608e3e74e6dbe3f4d153846a07484c2fa5ae596a
SHA512618963615db38d9ead4855555e7ca7558b0f3c9cc425a950e3f3457d49a5b50645fc9718a0693398d07bc1d822067e9fd8289d45f889586884daf25aedeb6cba
-
Filesize
418KB
MD5f342d254fdd33e76b2fd6a3f8b517de3
SHA179c91621ea96a6635e3934e9b46dcf23d1fc762e
SHA2568ccde337ed97230a54e20db8608e3e74e6dbe3f4d153846a07484c2fa5ae596a
SHA512618963615db38d9ead4855555e7ca7558b0f3c9cc425a950e3f3457d49a5b50645fc9718a0693398d07bc1d822067e9fd8289d45f889586884daf25aedeb6cba