Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 00:40
Static task
static1
Behavioral task
behavioral1
Sample
51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe
Resource
win10v2004-20231023-en
General
-
Target
51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe
-
Size
7.0MB
-
MD5
4dcc665d1ca0449ca8f3848c6dd4b0d6
-
SHA1
97c601f5d8ce771dcd7c16fae565b24b51bff92f
-
SHA256
51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597
-
SHA512
1e37df75348e3af9730c9d48ed0974e4207a5dd46e8c58ccfde126fef8bb7e4bc83ff7b09dd25b93009d60a091bb18023835b730c973e8252f77373da016cce4
-
SSDEEP
196608:dHVvwWB528rX22T3IjJx+2UTiADupsf+287nQR7L:/BB72sOADuB7nC
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2072 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe -
Modifies registry class 26 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 500031000000000066570d05100041646d696e003c0009000400efbe5757415f66570d052e00000078e101000000010000000000000000000000000000001dee2701410064006d0069006e00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 78003100000000005757415f1100557365727300640009000400efbe874f774866570c052e000000c70500000000010000000000000000003a000000000039e00f0155007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4824 notepad.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2040 explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2072 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe 2072 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2040 explorer.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2072 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe 2072 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe 2040 explorer.exe 2040 explorer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2072 wrote to memory of 4616 2072 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe 91 PID 2072 wrote to memory of 4616 2072 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe 91 PID 4616 wrote to memory of 3960 4616 cmd.exe 93 PID 4616 wrote to memory of 3960 4616 cmd.exe 93 PID 2072 wrote to memory of 1688 2072 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe 95 PID 2072 wrote to memory of 1688 2072 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe 95 PID 1688 wrote to memory of 4824 1688 cmd.exe 97 PID 1688 wrote to memory of 4824 1688 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe"C:\Users\Admin\AppData\Local\Temp\51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c explorer/select,C:\Users\Admin\HELanguage.hel2⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\explorer.exeexplorer /select,C:\Users\Admin\HELanguage.hel3⤵PID:3960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start notepad C:\Users\Admin\HELanguage.hel2⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\system32\notepad.exenotepad C:\Users\Admin\HELanguage.hel3⤵
- Opens file in notepad (likely ransom note)
PID:4824
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2040
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD53823c29c8fe18e23a5fae0e3d6b532ed
SHA1d6a6bb56a26f3a7b7a8f894237318b62d5fae432
SHA256a6226bfc3c5765048346a2ca643495269ff8b737a9ccd0b54f3d7e16920a3906
SHA5120fcf14683ecc0d485124f77bb431d1b8344bd3f0d1691ee747964bf3d5c97e48aa146d485d7384c72c776d41aa358835d44381dfe1f00dbbe24405fb0d1aae6d