Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
9Static
static
3Origin.zip
windows7-x64
1Origin.zip
windows10-2004-x64
1Origin/Origin.exe
windows7-x64
6Origin/Origin.exe
windows10-2004-x64
6Origin/autoexec.lnk
windows7-x64
3Origin/autoexec.lnk
windows10-2004-x64
3Origin/aworkspace.lnk
windows7-x64
3Origin/aworkspace.lnk
windows10-2004-x64
3Origin/bin...LL.dll
windows7-x64
9Origin/bin...LL.dll
windows10-2004-x64
9Origin/bin/theme.json
windows7-x64
3Origin/bin/theme.json
windows10-2004-x64
3Origin/bin/ver.txt
windows7-x64
1Origin/bin/ver.txt
windows10-2004-x64
1Resubmissions
20/09/2023, 02:12
230920-cnbflsff36 9Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
20/09/2023, 02:12
Static task
static1
Behavioral task
behavioral1
Sample
Origin.zip
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Origin.zip
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
Origin/Origin.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
Origin/Origin.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
Origin/autoexec.lnk
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
Origin/autoexec.lnk
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
Origin/aworkspace.lnk
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
Origin/aworkspace.lnk
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
Origin/bin/OriginDLL.dll
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
Origin/bin/OriginDLL.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
Origin/bin/theme.json
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
Origin/bin/theme.json
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
Origin/bin/ver.txt
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
Origin/bin/ver.txt
Resource
win10v2004-20230915-en
General
-
Target
Origin/bin/OriginDLL.dll
-
Size
9.6MB
-
MD5
77a1baf6f2f536ddd861bc7b8840e6e3
-
SHA1
df4af5e36c2ff61238cdf691c8e62d2af5f460c4
-
SHA256
afbff748a176dff968ced4bee463e429c8f21fbdbd859af6c35b2a16cc91282a
-
SHA512
d23bd95359389e08c945f7408901413107f5733dbb02a66f10af3207cc7fc8ecb5a813be53cb5f6163a8e50c0e38e9b4693993738312eee49bd39d91d76a2d5d
-
SSDEEP
196608:MJQR+brmA5Vs7IryoBVrdaOdPQl5Q5o79fXdFJNBWmQOrCZSgr1NIRKLFru6335:Vgfm8VQcyo/jQl5QEPdTDQO+ZLrH/E65
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3040 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3040 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2344 wrote to memory of 3040 2344 rundll32.exe 28 PID 2344 wrote to memory of 3040 2344 rundll32.exe 28 PID 2344 wrote to memory of 3040 2344 rundll32.exe 28 PID 2344 wrote to memory of 3040 2344 rundll32.exe 28 PID 2344 wrote to memory of 3040 2344 rundll32.exe 28 PID 2344 wrote to memory of 3040 2344 rundll32.exe 28 PID 2344 wrote to memory of 3040 2344 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Origin\bin\OriginDLL.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Origin\bin\OriginDLL.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3040
-