Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1737s
  • max time network
    1585s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/06/2023, 11:59

General

  • Target

    D8x3dO.exe

  • Size

    5.8MB

  • MD5

    5aec1e1e8da9cef6dd15fb1c89ce7024

  • SHA1

    ab94bfd4590d645132bc12c00cae180aad964209

  • SHA256

    e90e66c522960f6ab1d73c7d49fa415e4f69835d290dbb547384f1aa127b15a0

  • SHA512

    c1ddc25d00efefb2d8477c33aeb816d6808e5357e225af369e170d98e8e84ea1dc96ec5239e4055cfc4a031a7a097351627df6471f58fcc78c777130e041184e

  • SSDEEP

    98304:MNyndhBjfRDH7PWQbHhF5vftT/ZeZeA5rb2re/FaJXU5Y3KPejnKMV:MUfBRDH7X7X5vlTZNGTQ9l3xO6

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 12 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 38 IoCs
  • Suspicious use of SendNotifyMessage 38 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\D8x3dO.exe
    "C:\Users\Admin\AppData\Local\Temp\D8x3dO.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c cls
      2⤵
        PID:3828
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2268

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2268-145-0x000001A7D08B0000-0x000001A7D08B1000-memory.dmp

      Filesize

      4KB

    • memory/2268-157-0x000001A7D08B0000-0x000001A7D08B1000-memory.dmp

      Filesize

      4KB

    • memory/2268-156-0x000001A7D08B0000-0x000001A7D08B1000-memory.dmp

      Filesize

      4KB

    • memory/2268-155-0x000001A7D08B0000-0x000001A7D08B1000-memory.dmp

      Filesize

      4KB

    • memory/2268-154-0x000001A7D08B0000-0x000001A7D08B1000-memory.dmp

      Filesize

      4KB

    • memory/2268-153-0x000001A7D08B0000-0x000001A7D08B1000-memory.dmp

      Filesize

      4KB

    • memory/2268-152-0x000001A7D08B0000-0x000001A7D08B1000-memory.dmp

      Filesize

      4KB

    • memory/2268-151-0x000001A7D08B0000-0x000001A7D08B1000-memory.dmp

      Filesize

      4KB

    • memory/2268-147-0x000001A7D08B0000-0x000001A7D08B1000-memory.dmp

      Filesize

      4KB

    • memory/2268-146-0x000001A7D08B0000-0x000001A7D08B1000-memory.dmp

      Filesize

      4KB

    • memory/3016-138-0x00007FF613C70000-0x00007FF614B66000-memory.dmp

      Filesize

      15.0MB

    • memory/3016-144-0x00007FF613C70000-0x00007FF614B66000-memory.dmp

      Filesize

      15.0MB

    • memory/3016-143-0x00007FF613C70000-0x00007FF614B66000-memory.dmp

      Filesize

      15.0MB

    • memory/3016-142-0x00007FF613C70000-0x00007FF614B66000-memory.dmp

      Filesize

      15.0MB

    • memory/3016-141-0x00007FF613C70000-0x00007FF614B66000-memory.dmp

      Filesize

      15.0MB

    • memory/3016-140-0x00007FF613C70000-0x00007FF614B66000-memory.dmp

      Filesize

      15.0MB

    • memory/3016-139-0x00007FF613C70000-0x00007FF614B66000-memory.dmp

      Filesize

      15.0MB

    • memory/3016-133-0x00007FF613C70000-0x00007FF614B66000-memory.dmp

      Filesize

      15.0MB

    • memory/3016-137-0x00007FF613C70000-0x00007FF614B66000-memory.dmp

      Filesize

      15.0MB

    • memory/3016-136-0x00007FF613C70000-0x00007FF614B66000-memory.dmp

      Filesize

      15.0MB

    • memory/3016-135-0x00007FF613C70000-0x00007FF614B66000-memory.dmp

      Filesize

      15.0MB

    • memory/3016-134-0x00007FF613C70000-0x00007FF614B66000-memory.dmp

      Filesize

      15.0MB