Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
05/11/2023, 07:38
Static task
static1
Behavioral task
behavioral1
Sample
d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe
Resource
win10v2004-20231023-en
General
-
Target
d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe
-
Size
4.4MB
-
MD5
e2496aeb8076dac76a90215dcb27c2e4
-
SHA1
eacf71bd634528fe4f6cd21b642ad1cdf0762c1d
-
SHA256
d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f
-
SHA512
5ab6dfd41e8a412f7f746e198f34c937425b9809c217b43c508be3039c9a83fb8c08f5808568a9d26c500a265abc4e2c5ac576de3c16a960c62b1d9c40cac505
-
SSDEEP
98304:0OavURiG1aAGIh2NbceYfXwkqjdinnXMqBLVP2JF8t/R6kY:uvMFaKObcFfXw7jUXvreJ+
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ demo.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion demo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion demo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe -
Deletes itself 1 IoCs
pid Process 2776 WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 2988 demo.exe -
Loads dropped DLL 2 IoCs
pid Process 2056 d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe 2056 d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\systeamst = "C:\\Users\\Admin\\Documents\\demo.exe" demo.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA demo.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 demo.exe File opened for modification \??\PhysicalDrive0 d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2056 d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe 2988 demo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2056 d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe 2056 d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe 2056 d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe 2988 demo.exe 2988 demo.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2988 demo.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2056 d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe 2056 d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe 2988 demo.exe 2988 demo.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2988 2056 d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe 28 PID 2056 wrote to memory of 2988 2056 d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe 28 PID 2056 wrote to memory of 2988 2056 d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe 28 PID 2056 wrote to memory of 2988 2056 d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe 28 PID 2056 wrote to memory of 2776 2056 d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe 29 PID 2056 wrote to memory of 2776 2056 d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe 29 PID 2056 wrote to memory of 2776 2056 d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe 29 PID 2056 wrote to memory of 2776 2056 d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe"C:\Users\Admin\AppData\Local\Temp\d0ee97949d5198bdfa23b7f50f51fc44af3001cdfd33b6f907df749cb5bf628f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\Documents\demo.exeC:\Users\Admin\Documents\\demo.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2988
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tem.vbs"2⤵
- Deletes itself
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD590f2eae24402716ef9128c2a30ca0b77
SHA1e9193fd85a150d4fa965900dc14536d046d67aa8
SHA256f2b3da5a6c0d701de3f6e8908ce2908a4d0115ea5f16aeff7ce57c34328e69ab
SHA512095c17d5367b7c5e45115183f82a43550a3e01b1921d0137d83deda1672fb41177b56aff6f40ff7b2525713d655449e8567b99079d2ad735baa7428bf20ac77a
-
Filesize
275B
MD59b248a03210717b134119984af9e82b2
SHA10f97c22055d810b13c2a3a7336fb263f2c6913b4
SHA2568ffc37110f116ba0999f57be6fbed3ed3a993584aa71368b8c38af321457f07b
SHA5129f3875c5931613c8816516674979ad3f92e778a91de0bdfedf101acb844e5bfb9ab0f9e12f801e858efca8bcf3e149b9ac8204d997bd2ba691f3fef28383deb7
-
Filesize
4.4MB
MD5a3b8eb63491c477a4ef2699c6f79cff2
SHA10fc8a442bdb80cfc9f29925b8c88a2cb9c57decb
SHA256c22503e75f216b47dc3e13a410c79b53511d16d733ed1fc99ccc891c244d40a0
SHA512e5de6c9743bd740790993f45a843d2a7c5caf9ba64f2336d729b2b8947dc570bb9caa218db1965a05fe047a5a8c7d0e7523950c80af0e9f388d222681306fa5b
-
Filesize
4.4MB
MD5a3b8eb63491c477a4ef2699c6f79cff2
SHA10fc8a442bdb80cfc9f29925b8c88a2cb9c57decb
SHA256c22503e75f216b47dc3e13a410c79b53511d16d733ed1fc99ccc891c244d40a0
SHA512e5de6c9743bd740790993f45a843d2a7c5caf9ba64f2336d729b2b8947dc570bb9caa218db1965a05fe047a5a8c7d0e7523950c80af0e9f388d222681306fa5b
-
Filesize
4.4MB
MD5a3b8eb63491c477a4ef2699c6f79cff2
SHA10fc8a442bdb80cfc9f29925b8c88a2cb9c57decb
SHA256c22503e75f216b47dc3e13a410c79b53511d16d733ed1fc99ccc891c244d40a0
SHA512e5de6c9743bd740790993f45a843d2a7c5caf9ba64f2336d729b2b8947dc570bb9caa218db1965a05fe047a5a8c7d0e7523950c80af0e9f388d222681306fa5b
-
Filesize
4.4MB
MD5a3b8eb63491c477a4ef2699c6f79cff2
SHA10fc8a442bdb80cfc9f29925b8c88a2cb9c57decb
SHA256c22503e75f216b47dc3e13a410c79b53511d16d733ed1fc99ccc891c244d40a0
SHA512e5de6c9743bd740790993f45a843d2a7c5caf9ba64f2336d729b2b8947dc570bb9caa218db1965a05fe047a5a8c7d0e7523950c80af0e9f388d222681306fa5b
-
Filesize
4.4MB
MD5a3b8eb63491c477a4ef2699c6f79cff2
SHA10fc8a442bdb80cfc9f29925b8c88a2cb9c57decb
SHA256c22503e75f216b47dc3e13a410c79b53511d16d733ed1fc99ccc891c244d40a0
SHA512e5de6c9743bd740790993f45a843d2a7c5caf9ba64f2336d729b2b8947dc570bb9caa218db1965a05fe047a5a8c7d0e7523950c80af0e9f388d222681306fa5b