Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    127s
  • max time network
    136s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    17/11/2023, 02:04

General

  • Target

    Client.exe

  • Size

    155KB

  • MD5

    f0f9059b432a34b30443060f061c0045

  • SHA1

    729e35fcdd4e591631340b0a71a06516b9c106a6

  • SHA256

    9ab2087e5aa3c59077d603470cd2eab19ec3e34320333707c244808bd54acaae

  • SHA512

    694d1e338c66956d031bfd35392a9bc3546d86e7c5fc956a6a0b16f3260e43d644b0f04994a35d707ef7bb11523d7cdf786f9c86de9a78a1bb9c8e36a673e161

  • SSDEEP

    3072:7Brq0Wi3FSJ3JA48E3qY7AfS/P/pXDPXtrcyWe7oFUG6EeRWb13+f:7B20WIFw5A48oPRDKyW2oFeEe4b

Score
9/10

Malware Config

Signatures

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 39 IoCs
  • Suspicious use of SendNotifyMessage 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client.exe
    "C:\Users\Admin\AppData\Local\Temp\Client.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Suspicious use of AdjustPrivilegeToken
    PID:4900
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4900-0-0x0000000000FA0000-0x0000000000FD0000-memory.dmp

    Filesize

    192KB

  • memory/4900-1-0x0000000001860000-0x0000000001866000-memory.dmp

    Filesize

    24KB

  • memory/4900-2-0x00007FFD1F0A0000-0x00007FFD1FA8C000-memory.dmp

    Filesize

    9.9MB

  • memory/4900-3-0x000000001BD60000-0x000000001BD70000-memory.dmp

    Filesize

    64KB

  • memory/4900-10-0x00007FFD1F0A0000-0x00007FFD1FA8C000-memory.dmp

    Filesize

    9.9MB