Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07/10/2023, 09:31

General

  • Target

    53dcd0cf7477087f4e823682957b82122db51cfce93f8b2f5d7fda6338283206.exe

  • Size

    11.7MB

  • MD5

    a9a79898b6adeffd346ec7ccbc49fa85

  • SHA1

    8c55cb89cc7996d46e06c6261d27ed7a82507085

  • SHA256

    53dcd0cf7477087f4e823682957b82122db51cfce93f8b2f5d7fda6338283206

  • SHA512

    6e1d9349e3f85f064255b1dddd65adfe7f108dd527d3e93230c498d510ce30a15cf73565da32d8a44d48f24d939f0ed1b32f408f13b9e188a1bdc21e75cd7366

  • SSDEEP

    196608:DO1aT9/ah5LInZHOYNUqA0g6X28dNgovTQ0J7AdCIetOl27NEMSisx:q1Oagxg63dCqNT50o+fisx

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 36 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 29 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\53dcd0cf7477087f4e823682957b82122db51cfce93f8b2f5d7fda6338283206.exe
    "C:\Users\Admin\AppData\Local\Temp\53dcd0cf7477087f4e823682957b82122db51cfce93f8b2f5d7fda6338283206.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Windows\SysWOW64\PING.EXE
      "C:\Windows\System32\PING.EXE" www.baidu.com -n 2
      2⤵
      • Runs ping.exe
      PID:2556
    • C:\Users\Admin\AppData\Roaming\MyMacro\binding.exe
      C:\Users\Admin\AppData\Roaming\MyMacro\binding.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1052
    • C:\Users\Admin\AppData\Roaming\MyMacro\Runner.exe
      --host_id 3 --verify_key 8GxjJ1baHtQr --product "C:\Users\Admin\AppData\Local\Temp\53dcd0cf7477087f4e823682957b82122db51cfce93f8b2f5d7fda6338283206.exe" --runner_md5 Rjg4N0Q0MjY2MkI0RUM3RTU3N0VBOTI0RUVDOEM3ODcA --version 2014.06.19549
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:748
    • C:\Windows\SysWOW64\PING.EXE
      "C:\Windows\System32\PING.EXE" www.baidu.com -n 2
      2⤵
      • Runs ping.exe
      PID:2416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\QMLog\20231007.log

    Filesize

    324B

    MD5

    14d8946c2d5592d3e28d59c566f3f394

    SHA1

    f425bbb72c3022896dd4e513fe4e68af49454562

    SHA256

    344cb27b9274a5ae66362d4b7ef1e7d80fcc5d02d035030ca85ce7734b9cd677

    SHA512

    3b3ccd880114e17c9a0fc5439a1fa7c5839b6ab2d10958987ac50bf2a4a9a66cacc57bba62db8529bfeeaa7c0505c5e1247bd51068a21e52951461c4a13a613b

  • C:\Users\Admin\AppData\Local\Temp\ad-mymacro9.xml.tmp

    Filesize

    3KB

    MD5

    6a004b4196400a627b5b6248a2a2dcba

    SHA1

    fa9a555e83a4c3a73e07a728ec92827f55fbcf02

    SHA256

    9cd3e3f97866082f8edfed25d56b40786c2809f264c4f8b10c022403e7f0f101

    SHA512

    1b5cea41dce0742e4ba7a7f3c4bef3eefc92c63d267a306e4098c68b768723abc0f0eace4a486ff3f4b1bb8a74279dd04e9c2a48df9a20125c21209e3d205624

  • C:\Users\Admin\AppData\Local\Temp\mac7407.tmp

    Filesize

    330B

    MD5

    da54223333f3aee668a9333a9080a0a4

    SHA1

    48eb42f9797fbdfd4e444081ee8c432c841c8fe1

    SHA256

    041a4044f7b18c76d7fcff6cf11b72ad3f6128067c225d67ce6b7ffe08997c4e

    SHA512

    29816c98c665d697db0ce7c1662306fd6c9c31b2d910c715655d3981fccb1daa7a56c9e67449b8ed0afe08bad86362925de0203f0f90d2e20017485128a15dcb

  • C:\Users\Admin\AppData\Roaming\MyMacro\Runner.exe

    Filesize

    7.2MB

    MD5

    6293dc8adef748b02fb614733007ecd6

    SHA1

    105ee791a7f1a9034d70db76a4fe3765a761f526

    SHA256

    862e7f2a5d41423d31336f87fb405ed04768c92b948270cf7d0bf9c8892a2f79

    SHA512

    7b7d71cadd18b7ecfb70f04629d91637337236f6500b52d7c095c2b97a3380aefb3815c8804a67162c0a2452b0606d7ab27b04270d1c589afe39bda4993f6943

  • C:\Users\Admin\AppData\Roaming\MyMacro\Runner.exe

    Filesize

    7.2MB

    MD5

    6293dc8adef748b02fb614733007ecd6

    SHA1

    105ee791a7f1a9034d70db76a4fe3765a761f526

    SHA256

    862e7f2a5d41423d31336f87fb405ed04768c92b948270cf7d0bf9c8892a2f79

    SHA512

    7b7d71cadd18b7ecfb70f04629d91637337236f6500b52d7c095c2b97a3380aefb3815c8804a67162c0a2452b0606d7ab27b04270d1c589afe39bda4993f6943

  • C:\Users\Admin\AppData\Roaming\MyMacro\Runner.exe

    Filesize

    7.2MB

    MD5

    6293dc8adef748b02fb614733007ecd6

    SHA1

    105ee791a7f1a9034d70db76a4fe3765a761f526

    SHA256

    862e7f2a5d41423d31336f87fb405ed04768c92b948270cf7d0bf9c8892a2f79

    SHA512

    7b7d71cadd18b7ecfb70f04629d91637337236f6500b52d7c095c2b97a3380aefb3815c8804a67162c0a2452b0606d7ab27b04270d1c589afe39bda4993f6943

  • C:\Users\Admin\AppData\Roaming\MyMacro\binding.exe

    Filesize

    1.7MB

    MD5

    6abd36f782e36bcf9e90a3230d6ca97f

    SHA1

    3c3d5760a8db6c66f4c5b8c31cbf2613a8a7d6b9

    SHA256

    13652dae4ec58de8a20da51c7455f34144554b91d25ac1c72bec9cbe361ca752

    SHA512

    05463e3c0028e8e39787465e4529ad22c9c64c2a29701c4673f983b50852573aa3c197c2307fdf58d9ab514cca06f058cc17a8b53d28e76957792be7ac1acce6

  • C:\Users\Admin\AppData\Roaming\MyMacro\binding.exe

    Filesize

    1.7MB

    MD5

    6abd36f782e36bcf9e90a3230d6ca97f

    SHA1

    3c3d5760a8db6c66f4c5b8c31cbf2613a8a7d6b9

    SHA256

    13652dae4ec58de8a20da51c7455f34144554b91d25ac1c72bec9cbe361ca752

    SHA512

    05463e3c0028e8e39787465e4529ad22c9c64c2a29701c4673f983b50852573aa3c197c2307fdf58d9ab514cca06f058cc17a8b53d28e76957792be7ac1acce6

  • C:\Users\Admin\AppData\Roaming\MyMacro\qdisp.dll

    Filesize

    317KB

    MD5

    0c6fe138b1ea6a26dead585b6128bdab

    SHA1

    20d3f819698b12f36fd1f3e63bcd5621b574fd47

    SHA256

    372085c07df86bbd6b7588f1859b7fab8440a3ccedf643067779b6b9c6a67d93

    SHA512

    7d494cbaac76bfb8160088adf9fb6f3313ee56d3bb0db9e5c330c185246818d9ef67e45ee5877842572a50145810fe0748eaeb56c2359859dc8f30b80880b0d8

  • \Users\Admin\AppData\Roaming\MyMacro\Runner.exe

    Filesize

    7.2MB

    MD5

    6293dc8adef748b02fb614733007ecd6

    SHA1

    105ee791a7f1a9034d70db76a4fe3765a761f526

    SHA256

    862e7f2a5d41423d31336f87fb405ed04768c92b948270cf7d0bf9c8892a2f79

    SHA512

    7b7d71cadd18b7ecfb70f04629d91637337236f6500b52d7c095c2b97a3380aefb3815c8804a67162c0a2452b0606d7ab27b04270d1c589afe39bda4993f6943

  • \Users\Admin\AppData\Roaming\MyMacro\Runner.exe

    Filesize

    7.2MB

    MD5

    6293dc8adef748b02fb614733007ecd6

    SHA1

    105ee791a7f1a9034d70db76a4fe3765a761f526

    SHA256

    862e7f2a5d41423d31336f87fb405ed04768c92b948270cf7d0bf9c8892a2f79

    SHA512

    7b7d71cadd18b7ecfb70f04629d91637337236f6500b52d7c095c2b97a3380aefb3815c8804a67162c0a2452b0606d7ab27b04270d1c589afe39bda4993f6943

  • \Users\Admin\AppData\Roaming\MyMacro\Runner.exe

    Filesize

    7.2MB

    MD5

    6293dc8adef748b02fb614733007ecd6

    SHA1

    105ee791a7f1a9034d70db76a4fe3765a761f526

    SHA256

    862e7f2a5d41423d31336f87fb405ed04768c92b948270cf7d0bf9c8892a2f79

    SHA512

    7b7d71cadd18b7ecfb70f04629d91637337236f6500b52d7c095c2b97a3380aefb3815c8804a67162c0a2452b0606d7ab27b04270d1c589afe39bda4993f6943

  • \Users\Admin\AppData\Roaming\MyMacro\binding.exe

    Filesize

    1.7MB

    MD5

    6abd36f782e36bcf9e90a3230d6ca97f

    SHA1

    3c3d5760a8db6c66f4c5b8c31cbf2613a8a7d6b9

    SHA256

    13652dae4ec58de8a20da51c7455f34144554b91d25ac1c72bec9cbe361ca752

    SHA512

    05463e3c0028e8e39787465e4529ad22c9c64c2a29701c4673f983b50852573aa3c197c2307fdf58d9ab514cca06f058cc17a8b53d28e76957792be7ac1acce6

  • \Users\Admin\AppData\Roaming\MyMacro\cfgdll.dll

    Filesize

    64KB

    MD5

    e54b7e3ba6c2fd0d79f90e6ba3c019de

    SHA1

    bce9232085090de1b24f017730b7eaf4e7bff68c

    SHA256

    a553d8637dbe0645743eb5f76adf40678cf2fa1e01754f70191e729b7625949c

    SHA512

    fe7777147afea2e90cffa6ba44d7bd81ef036cd3dd6f771a1929811039b7ca4054be598bd5b4df704b5724bb654b1135d53cc617355ff2d3d70708560f549b75

  • \Users\Admin\AppData\Roaming\MyMacro\qdisp.dll

    Filesize

    317KB

    MD5

    0c6fe138b1ea6a26dead585b6128bdab

    SHA1

    20d3f819698b12f36fd1f3e63bcd5621b574fd47

    SHA256

    372085c07df86bbd6b7588f1859b7fab8440a3ccedf643067779b6b9c6a67d93

    SHA512

    7d494cbaac76bfb8160088adf9fb6f3313ee56d3bb0db9e5c330c185246818d9ef67e45ee5877842572a50145810fe0748eaeb56c2359859dc8f30b80880b0d8

  • \Users\Admin\AppData\Roaming\MyMacro\qdisp.dll

    Filesize

    317KB

    MD5

    0c6fe138b1ea6a26dead585b6128bdab

    SHA1

    20d3f819698b12f36fd1f3e63bcd5621b574fd47

    SHA256

    372085c07df86bbd6b7588f1859b7fab8440a3ccedf643067779b6b9c6a67d93

    SHA512

    7d494cbaac76bfb8160088adf9fb6f3313ee56d3bb0db9e5c330c185246818d9ef67e45ee5877842572a50145810fe0748eaeb56c2359859dc8f30b80880b0d8

  • memory/748-97-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/748-127-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/748-147-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/748-145-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/748-81-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/748-143-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/748-84-0x00000000051B0000-0x00000000058E6000-memory.dmp

    Filesize

    7.2MB

  • memory/748-141-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/748-139-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/748-137-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/748-69-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/748-95-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/748-135-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/748-117-0x00000000051B0000-0x00000000058E6000-memory.dmp

    Filesize

    7.2MB

  • memory/748-133-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/748-123-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/748-131-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/748-125-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/748-129-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/2188-94-0x0000000007600000-0x0000000007D3E000-memory.dmp

    Filesize

    7.2MB

  • memory/2188-138-0x0000000000BE0000-0x0000000001316000-memory.dmp

    Filesize

    7.2MB

  • memory/2188-126-0x0000000000BE0000-0x0000000001316000-memory.dmp

    Filesize

    7.2MB

  • memory/2188-130-0x0000000000BE0000-0x0000000001316000-memory.dmp

    Filesize

    7.2MB

  • memory/2188-124-0x0000000000BE0000-0x0000000001316000-memory.dmp

    Filesize

    7.2MB

  • memory/2188-132-0x0000000000BE0000-0x0000000001316000-memory.dmp

    Filesize

    7.2MB

  • memory/2188-122-0x0000000000BE0000-0x0000000001316000-memory.dmp

    Filesize

    7.2MB

  • memory/2188-134-0x0000000000BE0000-0x0000000001316000-memory.dmp

    Filesize

    7.2MB

  • memory/2188-0-0x0000000000BE0000-0x0000000001316000-memory.dmp

    Filesize

    7.2MB

  • memory/2188-136-0x0000000000BE0000-0x0000000001316000-memory.dmp

    Filesize

    7.2MB

  • memory/2188-93-0x0000000000BE0000-0x0000000001316000-memory.dmp

    Filesize

    7.2MB

  • memory/2188-128-0x0000000000BE0000-0x0000000001316000-memory.dmp

    Filesize

    7.2MB

  • memory/2188-92-0x0000000000BE0000-0x0000000001316000-memory.dmp

    Filesize

    7.2MB

  • memory/2188-140-0x0000000000BE0000-0x0000000001316000-memory.dmp

    Filesize

    7.2MB

  • memory/2188-7-0x0000000000BE0000-0x0000000001316000-memory.dmp

    Filesize

    7.2MB

  • memory/2188-142-0x0000000000BE0000-0x0000000001316000-memory.dmp

    Filesize

    7.2MB

  • memory/2188-65-0x0000000007600000-0x0000000007D3E000-memory.dmp

    Filesize

    7.2MB

  • memory/2188-144-0x0000000000BE0000-0x0000000001316000-memory.dmp

    Filesize

    7.2MB

  • memory/2188-67-0x0000000007600000-0x0000000007D3E000-memory.dmp

    Filesize

    7.2MB

  • memory/2188-146-0x0000000000BE0000-0x0000000001316000-memory.dmp

    Filesize

    7.2MB

  • memory/2188-68-0x0000000007600000-0x0000000007D3E000-memory.dmp

    Filesize

    7.2MB