Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
31/08/2023, 04:00
Behavioral task
behavioral1
Sample
69bfb28708d9947a180b9ecedaacb4b1ccd93871db1ced88e486420f11188ae7.exe
Resource
win7-20230712-en
General
-
Target
69bfb28708d9947a180b9ecedaacb4b1ccd93871db1ced88e486420f11188ae7.exe
-
Size
7.1MB
-
MD5
c271f8e939b0571f5cf304994d99a907
-
SHA1
83a62febf50166720f317de48196a663a48acbff
-
SHA256
69bfb28708d9947a180b9ecedaacb4b1ccd93871db1ced88e486420f11188ae7
-
SHA512
8405aad43ca03ad5311ba464ce468d782478905fb62393cd7befb3c9a703af354fe2b1b240025a617cdba0d57e932df87f7aace4cce8dcb0c4550e0e721d6bd8
-
SSDEEP
98304:ovbn0odLiXKnXVUk6Nga4hBWeZa6XmD/IWzFoI2kTYwDjcMV7C8hI6c+WMj1xtTc:Ali2XykeihBWeFXy+IFTYMjc2dZcBMW
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 69bfb28708d9947a180b9ecedaacb4b1ccd93871db1ced88e486420f11188ae7.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 69bfb28708d9947a180b9ecedaacb4b1ccd93871db1ced88e486420f11188ae7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 69bfb28708d9947a180b9ecedaacb4b1ccd93871db1ced88e486420f11188ae7.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Wine 69bfb28708d9947a180b9ecedaacb4b1ccd93871db1ced88e486420f11188ae7.exe -
resource yara_rule behavioral1/memory/2592-49-0x0000000004840000-0x0000000004867000-memory.dmp upx behavioral1/memory/2592-50-0x0000000004840000-0x0000000004867000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2784 2592 WerFault.exe 27 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2592 69bfb28708d9947a180b9ecedaacb4b1ccd93871db1ced88e486420f11188ae7.exe 2592 69bfb28708d9947a180b9ecedaacb4b1ccd93871db1ced88e486420f11188ae7.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2784 2592 69bfb28708d9947a180b9ecedaacb4b1ccd93871db1ced88e486420f11188ae7.exe 28 PID 2592 wrote to memory of 2784 2592 69bfb28708d9947a180b9ecedaacb4b1ccd93871db1ced88e486420f11188ae7.exe 28 PID 2592 wrote to memory of 2784 2592 69bfb28708d9947a180b9ecedaacb4b1ccd93871db1ced88e486420f11188ae7.exe 28 PID 2592 wrote to memory of 2784 2592 69bfb28708d9947a180b9ecedaacb4b1ccd93871db1ced88e486420f11188ae7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\69bfb28708d9947a180b9ecedaacb4b1ccd93871db1ced88e486420f11188ae7.exe"C:\Users\Admin\AppData\Local\Temp\69bfb28708d9947a180b9ecedaacb4b1ccd93871db1ced88e486420f11188ae7.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2592 -s 4922⤵
- Program crash
PID:2784
-