Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 19:08
Static task
static1
Behavioral task
behavioral1
Sample
191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe
Resource
win10v2004-20230915-en
General
-
Target
191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe
-
Size
2.5MB
-
MD5
ed8a89366a796c4d863945b5511a0128
-
SHA1
9a3656142f12b48c3f72729e94e3571f2eccc26f
-
SHA256
191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7
-
SHA512
79f11587f15df28e35c82faf8df3ad7ab696ad9fe28de96bc778ca5886ee3e923aa14b5dcf3e4cc40b3a84b29b4b89f357d24544b12f3b5668091670d501e307
-
SSDEEP
49152:GIJ+pFpr6GKCEQeshjkzM53nGbzWt6ne0uvoQQjw88Y:TOFNBKGtkzWyzW10kQ1p
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Wine 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Windows\CurrentVersion\Run\Serverx = "C:\\Windows\\system32\\Serverx.exe" 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Serverx.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Windows\SysWOW64\Serverx.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2700 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\LICLUA.EXE 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\Hearts.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\airappinstaller.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSQRY32.EXE 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\vsta_ep32.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\mip.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INFOPATH.EXE 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IEContentService.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdaterInstallMgr.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\template.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Wordconv.exe 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2700 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2700 2012 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe 28 PID 2012 wrote to memory of 2700 2012 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe 28 PID 2012 wrote to memory of 2700 2012 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe 28 PID 2012 wrote to memory of 2700 2012 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe 28 PID 2012 wrote to memory of 1208 2012 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe 9 PID 2012 wrote to memory of 1208 2012 191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe 9
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe"C:\Users\Admin\AppData\Local\Temp\191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe"C:\Users\Admin\AppData\Local\Temp\191645c4267150a507a6d8659101bb6a7ae5c32c719feba3bf04137c2d980ae7.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2700
-
-