Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 23:28
Behavioral task
behavioral1
Sample
Alien_Wooferr.exe
Resource
win7-20230831-en
14 signatures
150 seconds
General
-
Target
Alien_Wooferr.exe
-
Size
3.8MB
-
MD5
07df8b71759fd825a418a7075d4d0552
-
SHA1
61e116200e4c2119795ffb14ee3221b6022f8141
-
SHA256
b5c05c9af1f689f1967fb86b3bea8e6b0a72194c60ec7e7603ff0bfb772ddfc7
-
SHA512
fdfa5133eb4df7f6b358556d0f223cba8152ec9dab3efa6fe7c057fa3cf12ef582d4eed8056cd9c3eddd01bb7df1565aeabd200fe608401cc6fa0a32e867268f
-
SSDEEP
98304:HIm+0/3Os0J+4kgN37+RjDck6XQ1z0LLlxdBmPab:Hq0/+sM6gNAfcDaomP8
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Alien_Wooferr.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Alien_Wooferr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Alien_Wooferr.exe -
resource yara_rule behavioral1/memory/1204-0-0x000000013F2C0000-0x000000013FCC3000-memory.dmp themida behavioral1/memory/1204-2-0x000000013F2C0000-0x000000013FCC3000-memory.dmp themida behavioral1/memory/1204-3-0x000000013F2C0000-0x000000013FCC3000-memory.dmp themida behavioral1/memory/1204-4-0x000000013F2C0000-0x000000013FCC3000-memory.dmp themida behavioral1/memory/1204-5-0x000000013F2C0000-0x000000013FCC3000-memory.dmp themida behavioral1/memory/1204-6-0x000000013F2C0000-0x000000013FCC3000-memory.dmp themida behavioral1/memory/1204-7-0x000000013F2C0000-0x000000013FCC3000-memory.dmp themida behavioral1/memory/1204-8-0x000000013F2C0000-0x000000013FCC3000-memory.dmp themida behavioral1/memory/2924-11-0x0000000140000000-0x00000001405E8000-memory.dmp themida behavioral1/memory/1204-16-0x000000013F2C0000-0x000000013FCC3000-memory.dmp themida behavioral1/memory/2924-18-0x0000000140000000-0x00000001405E8000-memory.dmp themida behavioral1/memory/1204-22-0x000000013F2C0000-0x000000013FCC3000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Alien_Wooferr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1204 Alien_Wooferr.exe 1204 Alien_Wooferr.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2564 sc.exe -
Kills process with taskkill 5 IoCs
pid Process 1792 taskkill.exe 2644 taskkill.exe 2356 taskkill.exe 1704 taskkill.exe 2796 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1204 Alien_Wooferr.exe 1204 Alien_Wooferr.exe 1204 Alien_Wooferr.exe 1204 Alien_Wooferr.exe 1204 Alien_Wooferr.exe 1204 Alien_Wooferr.exe 1204 Alien_Wooferr.exe 1204 Alien_Wooferr.exe 1204 Alien_Wooferr.exe 1204 Alien_Wooferr.exe 1204 Alien_Wooferr.exe 1204 Alien_Wooferr.exe 1204 Alien_Wooferr.exe 1204 Alien_Wooferr.exe 1204 Alien_Wooferr.exe 1204 Alien_Wooferr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2924 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2796 taskkill.exe Token: SeDebugPrivilege 1792 taskkill.exe Token: SeDebugPrivilege 2644 taskkill.exe Token: SeDebugPrivilege 2356 taskkill.exe Token: SeDebugPrivilege 1704 taskkill.exe Token: SeDebugPrivilege 2924 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe 2924 taskmgr.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2828 1204 Alien_Wooferr.exe 29 PID 1204 wrote to memory of 2828 1204 Alien_Wooferr.exe 29 PID 1204 wrote to memory of 2828 1204 Alien_Wooferr.exe 29 PID 2828 wrote to memory of 2344 2828 cmd.exe 30 PID 2828 wrote to memory of 2344 2828 cmd.exe 30 PID 2828 wrote to memory of 2344 2828 cmd.exe 30 PID 2828 wrote to memory of 2096 2828 cmd.exe 31 PID 2828 wrote to memory of 2096 2828 cmd.exe 31 PID 2828 wrote to memory of 2096 2828 cmd.exe 31 PID 2828 wrote to memory of 1364 2828 cmd.exe 32 PID 2828 wrote to memory of 1364 2828 cmd.exe 32 PID 2828 wrote to memory of 1364 2828 cmd.exe 32 PID 1204 wrote to memory of 2640 1204 Alien_Wooferr.exe 33 PID 1204 wrote to memory of 2640 1204 Alien_Wooferr.exe 33 PID 1204 wrote to memory of 2640 1204 Alien_Wooferr.exe 33 PID 2640 wrote to memory of 2796 2640 cmd.exe 34 PID 2640 wrote to memory of 2796 2640 cmd.exe 34 PID 2640 wrote to memory of 2796 2640 cmd.exe 34 PID 1204 wrote to memory of 2576 1204 Alien_Wooferr.exe 36 PID 1204 wrote to memory of 2576 1204 Alien_Wooferr.exe 36 PID 1204 wrote to memory of 2576 1204 Alien_Wooferr.exe 36 PID 2576 wrote to memory of 1792 2576 cmd.exe 37 PID 2576 wrote to memory of 1792 2576 cmd.exe 37 PID 2576 wrote to memory of 1792 2576 cmd.exe 37 PID 1204 wrote to memory of 1612 1204 Alien_Wooferr.exe 38 PID 1204 wrote to memory of 1612 1204 Alien_Wooferr.exe 38 PID 1204 wrote to memory of 1612 1204 Alien_Wooferr.exe 38 PID 1612 wrote to memory of 2564 1612 cmd.exe 39 PID 1612 wrote to memory of 2564 1612 cmd.exe 39 PID 1612 wrote to memory of 2564 1612 cmd.exe 39 PID 1204 wrote to memory of 2596 1204 Alien_Wooferr.exe 40 PID 1204 wrote to memory of 2596 1204 Alien_Wooferr.exe 40 PID 1204 wrote to memory of 2596 1204 Alien_Wooferr.exe 40 PID 2596 wrote to memory of 2644 2596 cmd.exe 41 PID 2596 wrote to memory of 2644 2596 cmd.exe 41 PID 2596 wrote to memory of 2644 2596 cmd.exe 41 PID 1204 wrote to memory of 2580 1204 Alien_Wooferr.exe 42 PID 1204 wrote to memory of 2580 1204 Alien_Wooferr.exe 42 PID 1204 wrote to memory of 2580 1204 Alien_Wooferr.exe 42 PID 2580 wrote to memory of 2356 2580 cmd.exe 43 PID 2580 wrote to memory of 2356 2580 cmd.exe 43 PID 2580 wrote to memory of 2356 2580 cmd.exe 43 PID 1204 wrote to memory of 1984 1204 Alien_Wooferr.exe 44 PID 1204 wrote to memory of 1984 1204 Alien_Wooferr.exe 44 PID 1204 wrote to memory of 1984 1204 Alien_Wooferr.exe 44 PID 1984 wrote to memory of 1704 1984 cmd.exe 45 PID 1984 wrote to memory of 1704 1984 cmd.exe 45 PID 1984 wrote to memory of 1704 1984 cmd.exe 45 PID 1204 wrote to memory of 1964 1204 Alien_Wooferr.exe 47 PID 1204 wrote to memory of 1964 1204 Alien_Wooferr.exe 47 PID 1204 wrote to memory of 1964 1204 Alien_Wooferr.exe 47 PID 1204 wrote to memory of 2000 1204 Alien_Wooferr.exe 48 PID 1204 wrote to memory of 2000 1204 Alien_Wooferr.exe 48 PID 1204 wrote to memory of 2000 1204 Alien_Wooferr.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\Alien_Wooferr.exe"C:\Users\Admin\AppData\Local\Temp\Alien_Wooferr.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Alien_Wooferr.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Alien_Wooferr.exe" MD53⤵PID:2344
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2096
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:1364
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:2564
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1964
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2000
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2924