Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    381s
  • max time network
    264s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/07/2023, 21:40

General

  • Target

    0xcheat.zip

  • Size

    8.8MB

  • MD5

    f16d7af20042d713fabab2676fd28148

  • SHA1

    60ad53e69d4310c926d8da2c8812dcff0609b5f8

  • SHA256

    c50cbc77f3855f6d2cf5ce2ee5f3106866773a9717da99bd7a9da50418a08f10

  • SHA512

    72f0446b3e1eed4a1f28b37937549a5f918134972a6ebf0f59ce090a7779507ae303924f88f127c27212901b8583c23e081fed0b60a87705e11ea48fe49f689f

  • SSDEEP

    196608:V8E3v3ebPr3Iw6ocsaqYgRPOAeS+hs0P2SrtnMfI1V0XJaog:yE3vubbQnglO7S6/rVH2Xoog

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Launches sc.exe 24 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • Modifies registry class 9 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\0xcheat.zip
    1⤵
      PID:2276
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:2308
      • C:\Program Files\7-Zip\7zG.exe
        "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap7153:72:7zEvent13994
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:4700
      • C:\Users\Admin\Desktop\egBmy6x.exe
        "C:\Users\Admin\Desktop\egBmy6x.exe"
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4812
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4100
          • C:\Windows\SysWOW64\sc.exe
            sc stop FairPlayKD
            3⤵
            • Launches sc.exe
            PID:2728
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2564
          • C:\Windows\SysWOW64\sc.exe
            sc stop FairPlayKD
            3⤵
            • Launches sc.exe
            PID:1284
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4576
          • C:\Windows\SysWOW64\sc.exe
            sc stop FairPlayKD
            3⤵
            • Launches sc.exe
            PID:1580
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c net start w32time
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1772
          • C:\Windows\SysWOW64\net.exe
            net start w32time
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:504
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start w32time
              4⤵
                PID:2520
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c cls
            2⤵
              PID:3916
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c w32tm /resync
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2704
              • C:\Windows\SysWOW64\w32tm.exe
                w32tm /resync
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1720
                • C:\Windows\system32\w32tm.exe
                  w32tm /resync
                  4⤵
                    PID:2004
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:4028
                • C:\Windows\SysWOW64\sc.exe
                  sc stop FairPlayKD
                  3⤵
                  • Launches sc.exe
                  PID:1612
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:3584
                • C:\Windows\SysWOW64\sc.exe
                  sc stop FairPlayKD
                  3⤵
                  • Launches sc.exe
                  PID:1576
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:3380
                • C:\Windows\SysWOW64\sc.exe
                  sc stop FairPlayKD
                  3⤵
                  • Launches sc.exe
                  PID:4264
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:4232
                • C:\Windows\SysWOW64\sc.exe
                  sc stop FairPlayKD
                  3⤵
                  • Launches sc.exe
                  PID:4372
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul
                2⤵
                  PID:5016
                  • C:\Windows\SysWOW64\sc.exe
                    sc stop FairPlayKD
                    3⤵
                    • Launches sc.exe
                    PID:2348
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul
                  2⤵
                    PID:2256
                    • C:\Windows\SysWOW64\sc.exe
                      sc stop FairPlayKD
                      3⤵
                      • Launches sc.exe
                      PID:4152
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul
                    2⤵
                      PID:3632
                      • C:\Windows\SysWOW64\sc.exe
                        sc stop FairPlayKD
                        3⤵
                        • Launches sc.exe
                        PID:1980
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul
                      2⤵
                        PID:4388
                        • C:\Windows\SysWOW64\sc.exe
                          sc stop FairPlayKD
                          3⤵
                          • Launches sc.exe
                          PID:3448
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul
                        2⤵
                          PID:2540
                          • C:\Windows\SysWOW64\sc.exe
                            sc stop FairPlayKD
                            3⤵
                            • Launches sc.exe
                            PID:4384
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul
                          2⤵
                            PID:4808
                            • C:\Windows\SysWOW64\sc.exe
                              sc stop FairPlayKD
                              3⤵
                              • Launches sc.exe
                              PID:3728
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul
                            2⤵
                              PID:8
                              • C:\Windows\SysWOW64\sc.exe
                                sc stop FairPlayKD
                                3⤵
                                • Launches sc.exe
                                PID:4716
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul
                              2⤵
                                PID:4712
                                • C:\Windows\SysWOW64\sc.exe
                                  sc stop FairPlayKD
                                  3⤵
                                  • Launches sc.exe
                                  PID:2752
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul
                                2⤵
                                  PID:3644
                                  • C:\Windows\SysWOW64\sc.exe
                                    sc stop FairPlayKD
                                    3⤵
                                    • Launches sc.exe
                                    PID:2332
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul
                                  2⤵
                                    PID:4520
                                    • C:\Windows\SysWOW64\sc.exe
                                      sc stop FairPlayKD
                                      3⤵
                                      • Launches sc.exe
                                      PID:848
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c cls
                                    2⤵
                                      PID:4156
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul
                                      2⤵
                                        PID:232
                                        • C:\Windows\SysWOW64\sc.exe
                                          sc stop FairPlayKD
                                          3⤵
                                          • Launches sc.exe
                                          PID:1820
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul
                                        2⤵
                                          PID:4420
                                          • C:\Windows\SysWOW64\sc.exe
                                            sc stop FairPlayKD
                                            3⤵
                                            • Launches sc.exe
                                            PID:2372
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul
                                          2⤵
                                            PID:4644
                                            • C:\Windows\SysWOW64\sc.exe
                                              sc stop FairPlayKD
                                              3⤵
                                              • Launches sc.exe
                                              PID:4408
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul
                                            2⤵
                                              PID:2728
                                              • C:\Windows\SysWOW64\sc.exe
                                                sc stop FairPlayKD
                                                3⤵
                                                • Launches sc.exe
                                                PID:4828
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul
                                              2⤵
                                                PID:420
                                                • C:\Windows\SysWOW64\sc.exe
                                                  sc stop FairPlayKD
                                                  3⤵
                                                  • Launches sc.exe
                                                  PID:5080
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul
                                                2⤵
                                                  PID:224
                                                  • C:\Windows\SysWOW64\sc.exe
                                                    sc stop FairPlayKD
                                                    3⤵
                                                    • Launches sc.exe
                                                    PID:4968
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4812 -s 612
                                                  2⤵
                                                  • Program crash
                                                  PID:1580
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul
                                                  2⤵
                                                    PID:2808
                                                    • C:\Windows\SysWOW64\sc.exe
                                                      sc stop FairPlayKD
                                                      3⤵
                                                      • Launches sc.exe
                                                      PID:504
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4812 -ip 4812
                                                  1⤵
                                                    PID:2460

                                                  Network

                                                  MITRE ATT&CK Enterprise v6

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\Desktop\auth.token

                                                    Filesize

                                                    16B

                                                    MD5

                                                    4fb2a75bcab6ce266f67448a25215328

                                                    SHA1

                                                    4c24bd82c05068cc642268f1de0d9fd254f61b20

                                                    SHA256

                                                    efa1c3ade97e4d1780874b4892a09515c0b2f69e0d5f59c2336e38b26d3581e9

                                                    SHA512

                                                    4269b9219581a35678df26c3ec6048d1c5d9fc0e11fb6770280e893fd05ce844f3763a46f90b813725ac9e06726578efc8f3079b9615a2e48154401279705cb1

                                                  • C:\Users\Admin\Desktop\egBmy6x.exe

                                                    Filesize

                                                    8.8MB

                                                    MD5

                                                    f20abe6c5e6f555338c9fd8e1a7fd9df

                                                    SHA1

                                                    af13d38aed6a3551edf48f719bd8ee8c7d04f800

                                                    SHA256

                                                    a61a72cc1c925d6876c7481b0daaa80f77ab06176526e9fc37fc8a5fe5397120

                                                    SHA512

                                                    9972fc3ae1356d6c00ca8f21a4d9a42d15042468732b6a6b5647821a5629d1fbaf0304c2f21b41066f0f23d15a5b0ff52e4b548c695dfb9f55456f643f2cc8dc

                                                  • C:\Users\Admin\Desktop\egBmy6x.exe

                                                    Filesize

                                                    8.8MB

                                                    MD5

                                                    f20abe6c5e6f555338c9fd8e1a7fd9df

                                                    SHA1

                                                    af13d38aed6a3551edf48f719bd8ee8c7d04f800

                                                    SHA256

                                                    a61a72cc1c925d6876c7481b0daaa80f77ab06176526e9fc37fc8a5fe5397120

                                                    SHA512

                                                    9972fc3ae1356d6c00ca8f21a4d9a42d15042468732b6a6b5647821a5629d1fbaf0304c2f21b41066f0f23d15a5b0ff52e4b548c695dfb9f55456f643f2cc8dc

                                                  • memory/4812-144-0x0000000000130000-0x00000000018CD000-memory.dmp

                                                    Filesize

                                                    23.6MB

                                                  • memory/4812-143-0x0000000077B54000-0x0000000077B56000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/4812-145-0x0000000000130000-0x00000000018CD000-memory.dmp

                                                    Filesize

                                                    23.6MB

                                                  • memory/4812-146-0x0000000000130000-0x00000000018CD000-memory.dmp

                                                    Filesize

                                                    23.6MB

                                                  • memory/4812-147-0x0000000000130000-0x00000000018CD000-memory.dmp

                                                    Filesize

                                                    23.6MB

                                                  • memory/4812-148-0x0000000000130000-0x00000000018CD000-memory.dmp

                                                    Filesize

                                                    23.6MB

                                                  • memory/4812-149-0x0000000000130000-0x00000000018CD000-memory.dmp

                                                    Filesize

                                                    23.6MB

                                                  • memory/4812-150-0x0000000000130000-0x00000000018CD000-memory.dmp

                                                    Filesize

                                                    23.6MB

                                                  • memory/4812-152-0x0000000000130000-0x00000000018CD000-memory.dmp

                                                    Filesize

                                                    23.6MB

                                                  • memory/4812-141-0x0000000000130000-0x00000000018CD000-memory.dmp

                                                    Filesize

                                                    23.6MB

                                                  • memory/4812-154-0x0000000000130000-0x00000000018CD000-memory.dmp

                                                    Filesize

                                                    23.6MB

                                                  • memory/4812-155-0x0000000000130000-0x00000000018CD000-memory.dmp

                                                    Filesize

                                                    23.6MB

                                                  • memory/4812-157-0x0000000000130000-0x00000000018CD000-memory.dmp

                                                    Filesize

                                                    23.6MB