Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    291s
  • max time network
    272s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2023, 21:16

General

  • Target

    mesquita_protected.exe

  • Size

    11.3MB

  • MD5

    e5c8cb67b695bb7d8caa6c7884ee9f13

  • SHA1

    c99997e430a38fc9101b1fa311e6a6022f4bed6b

  • SHA256

    0cdb7065b5a3c8dd36eaa42969722cbfe295d7a9366f63c9acd9bc17cd90a182

  • SHA512

    c012511b396f7ce3283e48209c260007569b20c4bae50df17f4d0c1a8e4425d6fd9ad3447f56e52b02af5339343466c131d38b0b363d5ffdbdee8952296385e3

  • SSDEEP

    196608:5TMleb5lnNaJA7xIzIBnr8QTGrDtB7wCiBMJZj+oSpGgSIkQKgAPu1Ft:trbrnQJAFIzIB9G9iFMf+oSkgBL1

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\mesquita_protected.exe
    "C:\Users\Admin\AppData\Local\Temp\mesquita_protected.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1904

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1904-135-0x0000000000F20000-0x00000000029DC000-memory.dmp

    Filesize

    26.7MB

  • memory/1904-136-0x0000000000F20000-0x00000000029DC000-memory.dmp

    Filesize

    26.7MB

  • memory/1904-137-0x0000000000F20000-0x00000000029DC000-memory.dmp

    Filesize

    26.7MB

  • memory/1904-138-0x0000000007970000-0x0000000007F14000-memory.dmp

    Filesize

    5.6MB

  • memory/1904-139-0x00000000073C0000-0x0000000007452000-memory.dmp

    Filesize

    584KB

  • memory/1904-140-0x0000000007290000-0x000000000729A000-memory.dmp

    Filesize

    40KB

  • memory/1904-141-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB

  • memory/1904-142-0x000000000A2C0000-0x000000000A2D2000-memory.dmp

    Filesize

    72KB

  • memory/1904-143-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB

  • memory/1904-144-0x000000000ACD0000-0x000000000AD0C000-memory.dmp

    Filesize

    240KB

  • memory/1904-146-0x0000000000F20000-0x00000000029DC000-memory.dmp

    Filesize

    26.7MB

  • memory/1904-147-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB

  • memory/1904-148-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB