Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2023, 14:25
Behavioral task
behavioral1
Sample
5h8mj5hdmk.exe
Resource
win7-20230831-en
7 signatures
150 seconds
General
-
Target
5h8mj5hdmk.exe
-
Size
4.0MB
-
MD5
ea4fd817859f3a86dff0d31db268fb4c
-
SHA1
55b83c3f796c8819c169ffc9a5a97341523f1a5b
-
SHA256
b13ac74ea97a14c678375ef454399ca831a205f5c5dd2b29262336e983df6987
-
SHA512
00774e9c110f28cfff842b9aeb05a1f69dbf70d67c0e1a8adc47c6446f1165ca965021659d6a2e04068218b46ac56b91b8e8d95471fd2936e2f9ed0fc3c8264b
-
SSDEEP
98304:DHc0t5nANeQccqG/tkjrNeqngmUYF0/9z+H2n6Y6lQYBdFhs:Q86eQc7OWey1F0wWTOs
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5h8mj5hdmk.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5h8mj5hdmk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5h8mj5hdmk.exe -
resource yara_rule behavioral2/memory/4744-0-0x0000000000FF0000-0x0000000001A3B000-memory.dmp themida behavioral2/memory/4744-2-0x0000000000FF0000-0x0000000001A3B000-memory.dmp themida behavioral2/memory/4744-3-0x0000000000FF0000-0x0000000001A3B000-memory.dmp themida behavioral2/memory/4744-4-0x0000000000FF0000-0x0000000001A3B000-memory.dmp themida behavioral2/memory/4744-5-0x0000000000FF0000-0x0000000001A3B000-memory.dmp themida behavioral2/memory/4744-6-0x0000000000FF0000-0x0000000001A3B000-memory.dmp themida behavioral2/memory/4744-7-0x0000000000FF0000-0x0000000001A3B000-memory.dmp themida behavioral2/memory/4744-8-0x0000000000FF0000-0x0000000001A3B000-memory.dmp themida behavioral2/memory/4744-9-0x0000000000FF0000-0x0000000001A3B000-memory.dmp themida behavioral2/memory/4744-10-0x0000000000FF0000-0x0000000001A3B000-memory.dmp themida behavioral2/memory/4744-16-0x0000000000FF0000-0x0000000001A3B000-memory.dmp themida behavioral2/memory/4744-19-0x0000000000FF0000-0x0000000001A3B000-memory.dmp themida behavioral2/memory/4744-20-0x0000000000FF0000-0x0000000001A3B000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5h8mj5hdmk.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4744 5h8mj5hdmk.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1576 WMIC.exe Token: SeSecurityPrivilege 1576 WMIC.exe Token: SeTakeOwnershipPrivilege 1576 WMIC.exe Token: SeLoadDriverPrivilege 1576 WMIC.exe Token: SeSystemProfilePrivilege 1576 WMIC.exe Token: SeSystemtimePrivilege 1576 WMIC.exe Token: SeProfSingleProcessPrivilege 1576 WMIC.exe Token: SeIncBasePriorityPrivilege 1576 WMIC.exe Token: SeCreatePagefilePrivilege 1576 WMIC.exe Token: SeBackupPrivilege 1576 WMIC.exe Token: SeRestorePrivilege 1576 WMIC.exe Token: SeShutdownPrivilege 1576 WMIC.exe Token: SeDebugPrivilege 1576 WMIC.exe Token: SeSystemEnvironmentPrivilege 1576 WMIC.exe Token: SeRemoteShutdownPrivilege 1576 WMIC.exe Token: SeUndockPrivilege 1576 WMIC.exe Token: SeManageVolumePrivilege 1576 WMIC.exe Token: 33 1576 WMIC.exe Token: 34 1576 WMIC.exe Token: 35 1576 WMIC.exe Token: 36 1576 WMIC.exe Token: SeIncreaseQuotaPrivilege 1576 WMIC.exe Token: SeSecurityPrivilege 1576 WMIC.exe Token: SeTakeOwnershipPrivilege 1576 WMIC.exe Token: SeLoadDriverPrivilege 1576 WMIC.exe Token: SeSystemProfilePrivilege 1576 WMIC.exe Token: SeSystemtimePrivilege 1576 WMIC.exe Token: SeProfSingleProcessPrivilege 1576 WMIC.exe Token: SeIncBasePriorityPrivilege 1576 WMIC.exe Token: SeCreatePagefilePrivilege 1576 WMIC.exe Token: SeBackupPrivilege 1576 WMIC.exe Token: SeRestorePrivilege 1576 WMIC.exe Token: SeShutdownPrivilege 1576 WMIC.exe Token: SeDebugPrivilege 1576 WMIC.exe Token: SeSystemEnvironmentPrivilege 1576 WMIC.exe Token: SeRemoteShutdownPrivilege 1576 WMIC.exe Token: SeUndockPrivilege 1576 WMIC.exe Token: SeManageVolumePrivilege 1576 WMIC.exe Token: 33 1576 WMIC.exe Token: 34 1576 WMIC.exe Token: 35 1576 WMIC.exe Token: 36 1576 WMIC.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4744 wrote to memory of 4948 4744 5h8mj5hdmk.exe 86 PID 4744 wrote to memory of 4948 4744 5h8mj5hdmk.exe 86 PID 4744 wrote to memory of 4948 4744 5h8mj5hdmk.exe 86 PID 4744 wrote to memory of 4264 4744 5h8mj5hdmk.exe 87 PID 4744 wrote to memory of 4264 4744 5h8mj5hdmk.exe 87 PID 4744 wrote to memory of 4264 4744 5h8mj5hdmk.exe 87 PID 4264 wrote to memory of 1576 4264 cmd.exe 88 PID 4264 wrote to memory of 1576 4264 cmd.exe 88 PID 4264 wrote to memory of 1576 4264 cmd.exe 88 PID 4744 wrote to memory of 1804 4744 5h8mj5hdmk.exe 95 PID 4744 wrote to memory of 1804 4744 5h8mj5hdmk.exe 95 PID 4744 wrote to memory of 1804 4744 5h8mj5hdmk.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\5h8mj5hdmk.exe"C:\Users\Admin\AppData\Local\Temp\5h8mj5hdmk.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4948
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wmic PATH Win32_VideoController GET Description,PNPDeviceID2⤵
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic PATH Win32_VideoController GET Description,PNPDeviceID3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1804
-